CPANSA-DB-20250521.001/0000755000076500000240000000000015013507351012461 5ustar brianstaffCPANSA-DB-20250521.001/LICENSE0000644000076500000240000002156115013507350013472 0ustar brianstaffArtistic License 2.0 Copyright (c) 2000-2006, The Perl Foundation. Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble ******** This license establishes the terms under which a given free software Package may be copied, modified, distributed, and/or redistributed. The intent is that the Copyright Holder maintains some artistic control over the development of that Package while still keeping the Package available as open source and free software. You are always permitted to make arrangements wholly outside of this license directly with the Copyright Holder of a given Package. If the terms of this license do not permit the full use that you propose to make of the Package, you should contact the Copyright Holder and seek a different licensing arrangement. Definitions *********** "Copyright Holder" means the individual(s) or organization(s) named in the copyright notice for the entire Package. "Contributor" means any party that has contributed code or other material to the Package, in accordance with the Copyright Holder's procedures. "You" and "your" means any person who would like to copy, distribute, or modify the Package. "Package" means the collection of files distributed by the Copyright Holder, and derivatives of that collection and/or of those files. A given Package may consist of either the Standard Version, or a Modified Version. "Distribute" means providing a copy of the Package or making it accessible to anyone else, or in the case of a company or organization, to others outside of your company or organization. "Distributor Fee" means any fee that you charge for Distributing this Package or providing support for this Package to another party. It does not mean licensing fees. "Standard Version" refers to the Package if it has not been modified, or has been modified only in ways explicitly requested by the Copyright Holder. "Modified Version" means the Package, if it has been changed, and such changes were not explicitly requested by the Copyright Holder. "Original License" means this Artistic License as Distributed with the Standard Version of the Package, in its current version or as it may be modified by The Perl Foundation in the future. "Source" form means the source code, documentation source, and configuration files for the Package. "Compiled" form means the compiled bytecode, object code, binary, or any other form resulting from mechanical transformation or translation of the Source form. Permission for Use and Modification Without Distribution ******************************************************** (1) You are permitted to use the Standard Version and create and use Modified Versions for any purpose without restriction, provided that you do not Distribute the Modified Version. Permissions for Redistribution of the Standard Version ****************************************************** (2) You may Distribute verbatim copies of the Source form of the Standard Version of this Package in any medium without restriction, either gratis or for a Distributor Fee, provided that you duplicate all of the original copyright notices and associated disclaimers. At your discretion, such verbatim copies may or may not include a Compiled form of the Package. (3) You may apply any bug fixes, portability changes, and other modifications made available from the Copyright Holder. The resulting Package will still be considered the Standard Version, and as such will be subject to the Original License. Distribution of Modified Versions of the Package as Source ********************************************************** (4) You may Distribute your Modified Version as Source (either gratis or for a Distributor Fee, and with or without a Compiled form of the Modified Version) provided that you clearly document how it differs from the Standard Version, including, but not limited to, documenting any non-standard features, executables, or modules, and provided that you do at least ONE of the following: (a) make the Modified Version available to the Copyright Holder of the Standard Version, under the Original License, so that the Copyright Holder may include your modifications in the Standard Version. (b) ensure that installation of your Modified Version does not prevent the user installing or running the Standard Version. In addition, the Modified Version must bear a name that is different from the name of the Standard Version. (c) allow anyone who receives a copy of the Modified Version to make the Source form of the Modified Version available to others under (i) the Original License or (ii) a license that permits the licensee to freely copy, modify and redistribute the Modified Version using the same licensing terms that apply to the copy that the licensee received, and requires that the Source form of the Modified Version, and of any works derived from it, be made freely available in that license fees are prohibited but Distributor Fees are allowed. Distribution of Compiled Forms of the Standard Version or Modified ****************************************************************** Versions without the Source *************************** (5) You may Distribute Compiled forms of the Standard Version without the Source, provided that you include complete instructions on how to get the Source of the Standard Version. Such instructions must be valid at the time of your distribution. If these instructions, at any time while you are carrying out such distribution, become invalid, you must provide new instructions on demand or cease further distribution. If you provide valid instructions or cease distribution within thirty days after you become aware that the instructions are invalid, then you do not forfeit any of your rights under this license. (6) You may Distribute a Modified Version in Compiled form without the Source, provided that you comply with Section 4 with respect to the Source of the Modified Version. Aggregating or Linking the Package ********************************** (7) You may aggregate the Package (either the Standard Version or Modified Version) with other packages and Distribute the resulting aggregation provided that you do not charge a licensing fee for the Package. Distributor Fees are permitted, and licensing fees for other components in the aggregation are permitted. The terms of this license apply to the use and Distribution of the Standard or Modified Versions as included in the aggregation. (8) You are permitted to link Modified and Standard Versions with other works, to embed the Package in a larger work of your own, or to build stand-alone binary or bytecode versions of applications that include the Package, and Distribute the result without restriction, provided the result does not expose a direct interface to the Package. Items That are Not Considered Part of a Modified Version ******************************************************** (9) Works (including, but not limited to, modules and scripts) that merely extend or make use of the Package, do not, by themselves, cause the Package to be a Modified Version. In addition, such works are not considered parts of the Package itself, and are not subject to the terms of this license. General Provisions ****************** (10) Any use, modification, and distribution of the Standard or Modified Versions is governed by this Artistic License. By using, modifying or distributing the Package, you accept this license. Do not use, modify, or distribute the Package, if you do not accept this license. (11) If your Modified Version has been derived from a Modified Version made by someone other than you, you are nevertheless required to ensure that your Modified Version complies with the requirements of this license. (12) This license does not grant you the right to use any trademark, service mark, tradename, or logo of the Copyright Holder. (13) This license includes the non-exclusive, worldwide, free-of-charge patent license to make, have made, use, offer to sell, sell, import and otherwise transfer the Package with respect to any patent claims licensable by the Copyright Holder that are necessarily infringed by the Package. If you institute patent litigation (including a cross-claim or counterclaim) against any party alleging that the Package constitutes direct or contributory patent infringement, then this Artistic License to you shall terminate on the date that such litigation is filed. (14) Disclaimer of Warranty: THE PACKAGE IS PROVIDED BY THE COPYRIGHT HOLDER AND CONTRIBUTORS "AS IS' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES. THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT ARE DISCLAIMED TO THE EXTENT PERMITTED BY YOUR LOCAL LAW. UNLESS REQUIRED BY LAW, NO COPYRIGHT HOLDER OR CONTRIBUTOR WILL BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, OR CONSEQUENTIAL DAMAGES ARISING IN ANY WAY OUT OF THE USE OF THE PACKAGE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. CPANSA-DB-20250521.001/images/0000755000076500000240000000000015013507350013725 5ustar brianstaffCPANSA-DB-20250521.001/images/briandfoy-gpg-key-selfie.jpeg0000644000076500000240000121672215013507350021372 0ustar brianstaffJFIFHH @ExifMM* (12<BCiAppleiPhone 13 Pro MaxHH15.52022:06:27 17:01:58iPhone 13 Pro Max""'0232ȐАؑ     |5375370100523 4, ` 2022:06:27 17:01:582022:06:27 17:01:58-04:00-04:00-04:00.?"Han)dApple iOSMM& .h      r    B@     %! % & ' +%- . / 0  1X2 `803 04 5 6 7 : ; < @JjA*J bplist00O[jneOYQ 8o$^QSmF%l,/{/|#AHs;wsxIJ0{ /|~-)GG|V7F\]TS^laY_O=luY^jpd"~}E(  bplist00UflagsUvalueYtimescaleUepochL2\1;'-/8= ?sj1AZseAm1gYasGCxJt94v1xTM7uDKrq750n97566D85-200E-4D90-96D3-EC989DC93874X}2KFAD23100-2D6D-4703-846F-4CBFB66CC1BC"bplist00O,{?Ń;G~?z99ݼ?7bplist00Q3Q1Q2Q0" "bplist00  ? ?  AppleiPhone 13 Pro Max front camera 2.71mm f/2.2 http://ns.adobe.com/xap/1.0/ xPhotoshop 3.08BIM?Z%G?170158>20220627720220627<1701588BIM%b?rw1W(ICC_PROFILEapplmntrRGB XYZ acspAPPLAPPL-appl8GmOz/ desc0cprt,Pwtpt|rXYZgXYZbXYZrTRC chad,bTRC gTRC mluc enUSDisplay P3mluc enUS4Copyright Apple Inc., 2022XYZ ,XYZ =XYZ J7 XYZ (8 ȹparaff Y [sf32 B&n5" }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyzC  C ? ? #@;T*'\U31Xؐ9 {v Cn=?^kE^$QG'N8=sKC_M~Aw`G[:{ơ#Df zu:V_Ewt?? C.CQ6L R6YN;zF\9F26ST Xu^$=QaJ>rN2Ou}Q8$8߯k6w' 㿠"&uh;r1Ƌʁp<'>^[kIQ|YAV@s33P m n3SN|aOUR6s=;֠&쑜y4(]܁В_H f'x`FΣLb@yP:rO*m]Óԃo|g?ʑMpq 7cHQsMa8vi`ba`9cyڞx'%gGtCH;NzGJz$BF{9h %lwi˫[$2t/!vYN잀vYXdށGYmڹ\u=x&̷xHl +klc O֥Zdl1 OߵKBsxdaaL:^F}>RF&E,A3?H.Xͤiy$ s֢o7.L0P6H.сN&a1\7qְO)0yLJwyl\'?(u@l|<sVXF[pN}=9FuU݉[ڠ:npx^h#jp@ >?Cm5y<F `Ip0p(uF@WMē@ICOz: ,*~b#JknOLp2=M :;p[`HIۂ};u-.ʫW\n%OqGLgڞN7ciӞiR2bē9ǧ4~pb>Wr^Z3 3`wObOBh%X?/d-;sV#; 49iGc@+8zZ~i~q,`3ǧ֣`ʤ9Fڹl H|uhxv1Owv 78Sޓ ډڡzGZ~`6n \uT=##N T:}*l2)ݸ`c♻jBN8Ƥ8+'= 6E6Lh<.2=N;9A8"덪N@8 r:tJGvW=y (?xv#v@=9^@a<t 9烟^?Z`d dsl,zK$tGۀGauȩ2cSHN90H<3qڀHn̎Xu>Ԉ\J`t\c|}iA瑌kHL:8_Νl>=z`Yr1Si^T1ALՔ(zMc< 1 FW.r:u`UW F03yw=NYXG'wK&D{~=!?.X1݉i1@1I 1Ii']v稦?;o~I#f2NXI9gtn/''$;c r'MQ<@08S=NzTm)uߐ;g኱ RFTv1YpY@'sTv!}~8QH\r138 pXYH8^|?] J{y ۊ/,t]JI 8ԎvcO'?3Twp}Z| 4;F~tw `01b. MF'?œ@,yA t[*O$@S+ŰW$s:J$X`\JĐ x9e}ە,>#90}vqc9u '*˴?!$4N:O^`<ǧlA,1hsZʠ`T8uQOOof8 WO3<ˆRaϯ|@ d~3L'# רR ڞp2_B=A&;wv۞Uvp%Cs)9$ud<¤{zF~lyۈ$uLgkchj0cFxgJ;x}OZB@5Pm# snxI,Ʃoy` tTɕ9'⬁ r銤v9+Z'#{`6B;PO3AI7 G_qzcGv0'h-9O,1u(a۷S\fW?a沌=>T{V"g,$wZR9{4xF)[#5@ǐ1L lE?B qޟwE@gϧU~y @>JFg9#?ʞW0;1#qX#¶p>^16/g<;i:) yhUO>T-j+;ȰIP6#ۥ{!ʔ,]:?JnH|YesqktgZ?E'<28;^g{"֪eg229H(^4yl^6rTj  V~+5ۃkzě|>UI<iy jM2|bo0jT PG 9O$`XVΈ hn.cd=_%$ 9#͏,n H?I8o2Xd{tU<\TSV #z>Еwzc+ G6AvΘ_ؐHNI=9=-u;y3'5a.G>[ py\" \RG>RVTRRcB}9C(`U}ۈ>uwGk7eot˨\.qҥOܳ)n̄9*9{WڤlRlN$ţ/7;Fʯ={5`#Or>Gܪ2Ի / N8=zᏉT+!2@<Vc-^eu籩`tl?1/:~TNFQxD^ <J5F 1v A_҂7# r#+(cVI}qJw+]R1*3sx /R1cuqA*!'h`s 9@tZkA3QtrBUQ i(3~sRƎe՛<Ϛh!N0;0;,A;H|cҤDdӍ?CvF:c)~v ?wɨӒ: c緵G" 8 `UE9Aʎ֪HAm8Uf^NGyh$=ubXm> ;:'2Υ¶OzjiA$s?#)D? 45'I$GCEOT Tq99T)qH(,#9ڑI A8 x秧4.{O|7c'sPGSȥq,r6>?1CJYz=)U@݂8=q;=qϵKw 0?j2nNHCrw)6ߦ3֐ rI>*qG=~ TW%$oOZGV879+03O4 03t 4\V#, .A#wjkk #Փm$(0r{}M(P<{sEMJMoݐgJq /4q?Ҷs ϯӥ Ip;.#>2b U?^==hRN:AZ<&6SI<7㈲!drkYO 93A,I2NO87&9t䘁_''ۏPe@_{ w~UWܹ֞WP ʠ5eQ"l2604c`7cj ~.˨n䗂)d j. $z`گi5d%ln`N}{f2\?,W$H088=1"#q}3ߎ1N ,~SHR8V|V}We2u:9?Ҡ©8>7%vdрcOq`#9zҤcs)%'Un2\sL 0niܯb8#];O\gj'9|S;s/q@Fv&3y=1R O?PO#a>S'#I <=3HC<ӭ*A#+ӌ*5!Nz$d—!?g>-tj4Cd z.>ZVp w#6xi$J0x)V'=O=;x\ cU q Zo9941Q;TXa3 I=)Aq==hAuޖs4z:0PsמJ!el>`sK  V3]D#9q#iiōA$dg=wRĖ\>8FФtFjhՉb;OBFє1ހ1eS6$8[Wc9:Ys'[cM !<qr1-3v9P@Uk޽ Jo[1!$})C5 SϿZsƓH#?Qszz>iI9=1Y:@2`ܟdjFAS=OAU Мt98ǮSAoϥz+d`998z:םdp13}+N$`siXP*h`X)u<6+zt68X:;%[//`j7nG 0<~dUkq8'|SN-Fߏ UN={ڧUHQ[ YXn?Υ#_nSOT7;FX}AҠ)fGn`T1܌Kv88Th3+t5cL2}8 U}&ބ`vHF"31i8s񞾹ؚa;y;j<10Os޳8qxAM9=A=s'H'#׎?J,/eg9`'ۑ6'o[ ۸ tqcl41oI^1' ORx9bYQ gGR3N:tp6]?1888=1uK%=G^A?L ,J~?G0I g<)9#?5,M#+?ϯjYS^3y{NhбPϡJK0'=Obø1VL#jϟoc@G@3Jr$g#r>)pNшS"A㞽:St IaIuL~Uip I8?E!PGsVa=atOƞ.HJI'rxqҧ }03qz(<0qAd#g =@n9,F03Q$ZB\pR{{H3ab R %7* 2@PԐA\mKMbH!=*'o΀?ӼfƨEnp=Iz=F2]pF=I4i!'@;k@+5KL+h##0+)]D,zZnj-Xo{Iԟx=L,rU8tkZZ+֦Ȑ[lz✻ \炣"S'ڀ%[F:v⹌ .zty ;8 7^#ya<@t46w`ddϮj̬ #' A}Ӱ#j);pv1}@XݜnN?ϵFOˑFJLL9@{supbTs s:t5FޘtΗ'^Jc=ϯN1H2v|}84:@/p q{Qp'=iw8{aq|z{g׽9yv uyt09V88q_ң) q(Uؠ p23.I!xfltZy N@Ǩ8^h]($.x ~=s%b~9#@<'R8 w uG~ǮxFmÌtIw zz*+rCܕr Ue' ۾R?/#i7a  8_@:u(=s?_j\o)̪z[8_vcAb{ty`q5v1yi+2I8@ w_K~_JTc>Pr{Ӷn@8@gTWoA?Z($NX G^@T%wn^ cJځ~%Jp(׷p# ~\HkxoH26xR;#`geDY<`gp=a G4¨wd>'&Ac$g((pwL?uX*ko!ḡ>f<~9KM1u pC0?QS`:1Av ?#ۥ9Twscg<縩“c'NFqHzdcgJ00OOOŒN0{î;TX!{5>n?LT;N3rN6?ǭ=m·??L4FGLPAx _nFwO< 9x'dr1Du<|q})J8#EA€sAw}R0y-wi @sj<9b"2 \1O\qKtCaq=3Q'>ǰydvP3'#};|y#1}#IXnzs?qZ1`|}}HQ'ޤOlrP}G?G sSӻD;r-8<9{TQr1҃Њ3\AhhЌw?/NZ_!G@Fsc '׿Zbu@ <9N;瞝@=o\J F{ wt1ÌdQHm8^ǧ^;S ؜t1 \= RX|7LZ*ߑ=?2hɌO tPr91U8r1߿z!(8€4žYv@ g995Y'==)ݠヴ}GJ3`~av4JȒCIK0ִ&|=\P.pdt$d,q55Rms^w cs# ^Hing9U wwG^{zqAGXh N>泵=`T9ֶ v92VV$:wH%f?T~f,2Oj]9m䐰ÿ<_jB1C<:*uPFRqlu=G# dO<{Re <:bKnE;p9'S[nG^:Js9nNr; oN3@ ps=9?Z\kt2q{8q=Axyװ qǹsN BQzS–'ˍwӥ"ϯ#:@ f ۀ>"|'?T`߿Z.sW;+n'UIrw`$CSvdT*? RPzcӆ 8}zFR:|On3٠$uϧjapIl5++vrx$}*@hnu _F,,,-pA$~8WVᛖ oOj|8$[3N x@򦆑uU=zQ U#}3O Qªq?zB 1MF|F8$*xT$p2Ghع=xNA3''>@qޫLzh}x#_“`W`Y8=@>}? aIs@sRmsi6u݀sǧ ~rT}^$}=({dgJILr:}1N*@wF$4BA!ǜqA4) y:#|`㿷4s9^9Мfgv:Fp4 `; F$p9<Ҍ;s=2{Ґtz=qB)`h<`Ԁ/8= '#d8Oy8'@ H=Om㯮==j<@9p:ק mUe =d!# q^AQGsԄfsӟNܜgy}=gQt qF{~3 O\=8b=9ޢP3c+][(ssYS#BG̻r88;qfe1lޞ D"bdP˘ؒ>5Z?$,̷3-%{*2 qюs_l%a6Gt5Ոh46z0;14힣ϭ=@#?l=.v~LUM^Ml~|^q A=jd;1>opzښ꒏XH}_ܱ,ːz}kBw2{n<pS69y[TԘ9P F;S}21y'c-cRB=+4"ql^1ݴG گA$u#\+DÂ2}Ey!n=/Z{rπ{N*(ש5(\OcjX2A>ΛzzAp,Wn2̽}ʀvp2q>z@ ?ZgwϿo81<˜c0S68OZ̨#x<?M۴pOL?1ʘA.Tc J̢>rGqڌdӏo犐6n4F;HF<{b 1BF9^P` sOiF{zsH\A+קjQ܌gGS}j A=pcӵ < тJ3ʃ ֐ ہ0{s@H1|.>+|Cd;Ɏ#zI)9_Iw8眱58>#j.q۩<؛Xѡ\'q>%R zךp\CNzЛvNq/ܞxS$ 1Fs8M܌wM[FO8R' :~gسw`=}sUg3J?Xr)gtfBA@wu#r*YpqFc'%6CryzTBp?qҠ<ϹB1an~֗p?(u^zqӏҀ%Vm9!,HVR$`t?_}B܆>Hh"?R8׮@1N t0x[<1VʾGLu=Q+3N]z}P2GQ׃޼=u-HWßN,q}rWQӭ N= @*z Μ0'8o $c^RXNxzԄj[suۿ$788@X?L몒 urKcps5Np);5 r[)><^3$Gf 3u@@##_KsԞ32yژ-o_oƕbI>Dhۀ1c?JL2>(pzϿA>7$n@g8<FࠀO EЂA ~(Mŋs߾=kGNp~AV$u_AjCCr1=}}~PpR0P۞{*&PX whCd u(|l|aq@Îʨ2|_fi : c`9/D"TuPN2}k=3kg:qڽwAA ώ2NNs*H8=Q$=zyLa(88yUOPɶpy<Þ0;`+yW-'PCF=?Jnz=ErU}6lt7 I8l4\-1v`Rv?ZRc=O۸x{y\a1Glz*b>\p? HBaUa;J 3AרcsR0N0ǺlFWnFyϿY g֦+ʢH6a!?5,hc/E@j`2pI>cu?5ӎIxw{Rlwʔ'00{olR 08ӓzzt>);rN{O~21~;?Yxu ` 搨 ?A>>Fpy#5@8 01ߠښ8T9߹x=dN{ c;$)L_U98S l$a#$F 9Ҁ  jA;{SHW$mUUV ~Ᶎ7hz9펽CXL*$clVoIJ!qN끌ԻΡ'JߏZ_2//Q3ԍ] krw- <9[q~ctX7Mɮ@ r9 G5;k6⋸nu5"$sϭx?X>J^^+@O\tUw4?1Pr1>8U8icI)8P#-jڌwq( dQm>` s>RPJ'WaMwnژO'=sJ4BN\ZFq4 ;L)d,ǡAR' @ɧ znVcIGן׭}3ބzsLA>l77Zp`ϭR%dgrA  o9R#8>uhg֙#>c?/Hn p~O1SB!JHH Gb `n9җ 4'JpV6s{""(ps2Fp>%r`0rG'wN570U=SO#8{DZ<9s]) _iXk6y;9Ocԟ@p$ܑ $<O^рÐA#=NiF~f|>Ҁp o=N @׽3? pG\<'Qx$uPp;`T#p N:҃ʒ9^(>*1=x+mV@SuyiWprO;qTe1,~2@kȪpG0qEr7n ޿J2}1gQM'ʣjbqE(u8I!XpQsB`s})زx@gUs$\{Or܍>[ 0y_Cxc~8xT/:pxBGyiH$$dz8U#;<Mlm%<ڐǖxyқ"sON1JR?nLR%Du<~]S}c~Deӎ.]`/LPRA 7{RP(t0v9펜P 'ל@/~c^_AIbUxQלӉ'N?4~ϧ=M;f-O\d:tTdS8$r:&$( r2N}=,qA?J.,31x:R:JsSԁ[n@pGL4A{tǮi6>cO `n:!8s9*:{T0?6Cv}3}pPPwڙCgN0N:R1 77L~ 0x}ڙr0??&oRxzԶ!yRźFM+9,LzƕT21֗Xi ~n'Ѱq?)P`[$#zjU۸1MA8O=NH,#FN2G9_WnT|qȠH3{S kOˌQL3cJKZJr۳yүNn~9ިOq+R"\ 9#~9Q0O}sN`gv9iX3F9=>I9BVr=}jd ɬI71NBBgȞ5 :(}ot{8AGf,aR3˨8}k!&\"PFywߎz hqNZs 98$'=8暬*;}k5=GB{zk-}?ϧl0 G֪^/ <ӎg=p%0szWoo+d㞜umĀy0 9;`A[H; q}|00>'9Sr;x֠m:}:דp>@_޽d'<͏|&_a s\sN;:=ɉ;( 9Zn)H@h#8^u} nz Cn8qtɡgL#*v@u?3I?/8`$8>..:M#iF@ibᴏ@O\l0Ͽ;SOx9G:s_Jfy 3楱Ii0z9> n{cw8a*GH cs4G+Ӱ= Ji9N1=zsTt8x4z sJ@"8r=WF5P@b1yF {\:V'O9 6 @G@!S?GLV $v=W+bFFr1а5Yߛ#VA~p2 k8QlR_/!XI$I=~2C$u@={~?QJ1>)pvO_ÕS _O; vH8#)z eFUϽ=aGӑRn$9H=ycAT2Pvc'K[u7ln>)a\(gw88!Gl)20X8hpGq0K[??Ti8VN?[݊H~LG1Q88<~ I3uW<ҫ`rB|q8d#`vImz8 ӟӶ= 0;,Am@g<64>\c?Z 2:+m`:g TltSIrqˌ6:Cڡ{dO x yx^9@ETn~zę1B?VIA^S`6푈8?>c )Sap2kFo$pxsϨSf1J@(q댒 wFGj c~Ҁ.%S 1gnN `ÚT%zg tjU 98}hB cz 9H:$?>ʶH,#H} r0jBxۊBNHd`s=~X٘21#)p@F2pp:Ɨ$ irPN?ƕv<қ cHm}6߯֔pcxg8nvӞ2=s6dc`Ҙh1 Rg=;pA`i[9si RH p>;2Ic{Se>c8F\`OSnB\sTLv;I 4?皑ri wϹJLh~nCܚCG?^8qpUW |})\;ן֕Ԩ'7HT9'9i)JIiH\A1zƾ[Hr*9`cR @݃AqPJ۱:L Io,[z u"5Y'!;sa:n00 '#Hii˂-A}Rb09#׷)=Ft)89=h2'EpwtjTQv9ǰ򇅊?$ 0|qM ,IǠ&3H 1H~9s_S_ C׌P4rGLhJT}?wנ rg+4VU[ݯ80@=i8?.Jw&B_9=PL}[F3 nN:`<]l8ʩ󞾞ƺ*l9N6ۮi2 e^I_GQʐ9R?^Q |M"謜Yasc>b؜-q9nECtvzHQ k [s63k'ҧ{H26@ #~elbr~cy=lOyU J2ԧ*sZB B;G_œ n2 r|8'S8 Vq=9|=Iig##Nj=#56(L6?Ϸj88=?sӒ ۞rj5߀2qϿ&)9P܂r:`Әp}R:L388_j@F1'=>rs۞! zLh@}ןEc8ہN{{rsz>R@04?tNq};8 uE(>x8H 0 f~w8lPH8=_ m݂F}3\ ~F0ғ<1ccFOޜ{H?O;S=h)!WnOwƛ'x=p< {tu^N=>@89}{ý .0Ia;q㯯Oʜ7[Ali?\9ޣm78J8PR`m|cլvTظF;y&f^8O}6׌ { x*,Ѱ $rFA'c$$$OQZ 6p=}Jx\7Br{.냜?¨hqAoenO;2?Zh.0qHcLfrw`*XG9$qړ[mۀFnn8'ݺБ#H>OqU3rǷVHe~_G 1uLhڠ:p28ֱT :_^ ѽgT^݀Y!G s|z  q~>Pq׷2x82t q?i\O$C99܏qLS*jWpڤ I96<&#03,p3I0p0r1v!rǿC~iK9 99J HI?jwB c?*rwv9#R7y q)` sG\d t vI=OX~dn^9Ǩ"`4.eIx!$G=qR(-{>SRؤr~zCa?J\}c텁@ZUr3r?ȣpHC'`e ╔9Awϭ188'ndmRm z#C qZ+fW =q׌c8Zs`ulgjfz2pHӎ֓`Ɍ=nI=?Z|==9FNxQ3 N@Ы8=)Dh/#'pҜ+st$%U N7`g\3,rdbq>ss]cǟ@G+6w톝k2o͟ H3(*9p}:c5+BdI x@(n@vb zqq׊DH ؎FG@ USUqH?R]=}ʘ'!rOSa)a.a-0zpzTaG#rO\qӊpI:OƀB!s*sS>zBIV<|:@0t>n韧=)`8*I aP1R֛PGczZ$߅&V )0zuo,6s:JvT#H)nFpqsM3iwr8O9fʅ@{M$NFz*9`1N{R>c(-vAҚ :gԌ>Zf;O<῞=i}3ҕƄ%H#9409;['993A*[ m lNS9@*Oby?@)[8}!pzT6u9(~ >=Ji;w'=3TUg8 ¸ٝx%s]҃6d юGIy9*;qʴٱ9?{ßL>ބrH񠜷s>VRy=Gs˖g={zU'9Go]Dɸ=~㸙gTg\})zzضd~pzk/ G3 'efG9wv+5[siH>}I\)N$0y 2ݣb0p==欝ma2^*I\ uA}#] M/<;R~0q!r,FO9";l}O4/ szndr;578qK@ ONLT m_ H@ }?*v6|;T:A=+Jǿ}X x'EbAa>sp8&~\r;~}3I $ 39cIГԽ:8LB1g֐*2Fx? 9'ilvO^iG\W aO1㞦`0F@?S pNs`xdqIcq rT'h,8#?~c4xR8'=4 {aQ>\ly]jpOs>M~ѷp=kѶw0x{;CiAlq0hOVMj֙V\.O 2`&" Ǜz_Hߩm2ẅCkOĚtl%pK3m־!?ya!5\w*$a)I`KqU,ytP3cc:r{zR xnN 8+>\GC#$ӯy4$ <ޢ3ˀTb[mb@8C{ld8*CGS|G$s .@ϭtHP<Ұ FX)ך #o\}L'9=p81pzM0887RF1O˜c8~*@HUS:r ۏ@X2TuPXtp`Vd zqT̸^`gTJF qvElۿ8!8U: Oe$9#=9i`ܥzڔݐwcb<?O\>PIqK0RrG$zEnA9a3@PIx1pI`R;A8Ԙ=럧'׊Q9t\K ==1q3z|iϹ'}j^61'>S erI LOQh܂GN>u84v :v@OA(p8d=OLPJ^{,X0 U-!1߁HĐp}Gݷ?( HP7Q7{3@ŗsCPx<#93_\P};F shT0 ɦCq|0=G(eSۮ@r#ߦG4}>jBhԤml񜑎zI HxEr^ }>qf^0$c9y_ GSc [qLЌzE$׮0})0pA`qבJqRFq;Tx g^6#w(9sMalfI8,7RGlu6enr퓏Q̍3=!@gpHM# G @O1=PzPN~a|=){K>!\z':WqXgLl7wiI9Hǵ&\X>0r0p6}n'<°W~]@61䌑4[{H5"N1?Q`׿P8i7q ЏLX1=:#ҘN>R`0czo<<###}%͓Gl|v~G4p9<{# 9G quclplsp: (*s@9rrq3 HZb(Œz_JoJA=H۱{zF*l OL=A8=9421=zޛ#q=7sʋPw2;t.3O_SSz* Bp3߿&+MFu z#$$3y_UP+nG׷5m:\dSJn02av5$\ÀO >;~=hU݅8cj#?|uC1f;sT2^[\3]]<{nXeA䀨>>;BS~4a>3x㑖W8pa}Kb 'Eug ̀g4Ftg?q3ǟi\`Nsּ[$:ue9(n 0H ҢV6q}hM\e{h~zJIUNth~ƒp^]&{g=}9E1x=*" v<}|d7@t? ])>՘ v߮>qK(Wk 99<+ʸ܅=W% d>pm3qAS[ ~~}T~qzn@'{W O-#{Wt珧|5ёۛ\GLw dl#N$;~\tc,qrFp Tyc~E(byj3z:JpS =1vIRs{wL[ry8AWIʩ63{:.mL : On}>2: !sԬ ;u=|:9?ߞ?.*7B(To9zѷ*y8"rIݎ2xG< =1ޜ7௿1u>JSOPGL>ړ@Gn600S۹`&ӑ^d9#ϥ.+ǧ|S289oǽ {',ss=1t~T} S9?.''z9)_*1|Rwt?Ƞ s~"9sACHBg$gh-FGg) B}I vL8U.IO?ױ0zq {zޚ26=?za灵&Bd:a rH$C4ߘprqt 'ܞSRp8ۀ?JßqpNv`;] A$g\SʚHsrHͭKYѯ LetQ>? Z#6uGqk¾+mb@ԒWC=Aܯ*2r=/%A54!$cumh1A=x8NGB40|F*UO6 ~9s5c;Cum$摧Cc"ÞoPHcdi\ 3FrO+~_qIБi^s/ˑGNU0}s҇,3rB~4t @ǩ9ϥ8I~<ҁǭOǧOZBK^ޟO+(n8=:>8<2}zRlB.OrJr0FzgdczW ` ;P~}݂x]TmBJrx aל:U6g# #LI`pN:}ryDZ%F7d<zJ1 qZ*МsYc(8?ӽ_їe9!F{}xAe;0 :^zQ u鎜Ocקg$7L+w`Jrq]eNc>¬X99?7Q(Wd;UǸoc2 s* v]`s|㗍QXs9Џv [Bs=ZS35| Fs07m SA' _gonyj oKp[HBœ?Nn\d0=#Ć^2Y3hk/@BmW6M{7 "u^}O$LOn}z% B.Nyom-JA cQK %AyOO19N1PH;NGx3O>=ۓ]0bʹzt 9>SjMZ (Q2z#îpU4pEOpV C#*H>'C0 s ;q'azq= H}A=9_Ns۱1ǧ>R6{}EC@Fv5!zsG>aFnO}:~5m1ׁ!F[Gݸ8#;h;PNBz;`WcZw$?ZQǯx%OsJ0;s=zМm G\R{r@~U6q>ܑH9לc1 N@9Z 3OAԬI$n>H3~!~mQHFNy'`9AAԜ}):i䷳`{R)&)-ң9 lߒ 'ӊ\Ab9sޓ$n`;PU F#*FzqU^1yjPrF>;v"wHzc(†ߏJx'=1֕Ww=P +|1]k|9> S= ybp#>\'qlR+N2}=0zc֡ؿh3*ß,dsBy~JXӹ13O2zsڼ'I[z~~dc^27.cqԙkH@ZinzQ>pYpe :ߧ);px~2@ۚ z~=iXy`;A9bʑ۹za񃏗3ߵ6k 9dLsGe`nj9QH2' s~؃d:{T\ni3c#L#r;8ZWcn[~cO5G@F7'Z3隋nNw:d%7'QQցrp=\w?t0 H)㑊`39GSJ.` nC܅㿧LQrp8$OPq1;#2\>9I98¹~s(knzW29Q}~ԬNr:88'yY!1$N949Nbr}'р{ۥE-@aYRv m'#}kN<֢'8x>Ԛz϶=6%p7z6Iq4uӟҋ߼y=OLvGWqO^ԅS OX֡\8*d =1<=i<(qZLm{"m299o\{R@ dt=`S #&19=TۀIQᏭ)ٷtрq1Қq`῅G~S@Tl9r; sCETkwH>eI9t]܈$,J=?ZJ*ܩ9PY}1p9pxp< =pF:nNY2=;rxsy玵Z L b?2pf3*g" DxQ:{oDɹJvƄ}qs"4 _z vlq>(PK}JRp>npq>Zy\(bS18ǧDϘXFTю䞟Z౅?s?Dɉ `d`סY!4G9f q˶ FW s۞Zw6P?JB-܇}=9㜳V9p=iF=2G"cұ|[]R5'b}0kuI$:zvsVS` }}=j|I~upy#~rG^~`KIט|~h[{ew89TQ|3N#޳3GdsgލiV?ʤ緽5Xc@FMc$~ `9ߥ.0=󓟡|ϳQ)By9BUC FNZA==}UN0HRA?. 4||rGBJ OLgg4 G$4ltښ35, Ӏ~#( uԩ9}FS> >W#pO\G?=QqO6_p(ʒFpOBW $3H g?H2#N=NLszn^C{㑞q 89\)F=)1rr:^7`ujo# Iߞsޓp8@>Sۦ;S~BqԦr3v PO $zS#9LOyS^FLiVbw<޸G6UN02s8]\fZY,ct kT g[Ϸ՟͝>ݷ| ԛQ3Q`l۳T\3{QwM tV .x8oʾ18v޼qH-Ouıs} 18 *Uua83$x)r{lFo8?LSF>lG9$M.n8 6sO dkkBcUNqwԝ3q]A9E)fn6cDWk 1QƳ-pzgҵ.sc>fb*mqyLYھ'cTNXA8o"v9?FN%y>^Ԁ3 ҥn<9~P:S z`qIT=xR1qަB|܎xyu+(FoBH'c)6(f\=?0W;Y@#<ܮUZ_̖L$vny˓ӌINww8@U<NulHo\" zJ2ߗݸzSlKr=}ET84r~S`#=z@;F$sP6܀OO~?:̹c B7`>."##pq@H*Uwdg$+`1 U)"]mf;8 Si\}})A=:sRrb8j`FAl* +ێi:u42N)I'\`9S`>:dvV#=j\/sTSݸ~20n sS]~Cs8xNa=+OLu}2ԷA=G^hIc?ғpFpydzdwR6`uREʜNv{A;A隝ISfB|Wo'#T8xXȱNwF9澛gFPAx#Cɒu⾜ `;$zwS"3 >Ԍpt#q*F:g8'T=3gyA)'c̆El0u<$M^:uJvRdFF܌cҚGܒ4e ӿRN*;ۦAI( 9zםTnw@2tf9$D8U4Xʂ<*np=|qHN=GzP>n889v"GPg%({Vz0kssqJ1{i(Sw>o&ҲNр;~_#OI {!v#϶qKTiМ. ߓtK ި8k^@q s;\>>%)SӜu/G'Jh/z Lsт`/k3 j@;)V2T6\~md s)2 G?h1nN9#ks@#ȹؿ6ϧU07F~\Lz*48RzѝxfI?1ީyf$O>qsSOW` 18ǧ=] 8O皀FÀր돘$N})E 8$ԟK. 꾇GJV 0{;pFSjI$2–#hp )s:v]WX9܎F*,C( ޣQWV8 {&ߵ|I 4n9ISuCa7d%Mi˟ggnA9U~T 8$ךx }V&_2sOz+)me4r!ӧ?GtP #QZ=>s1܇"dn֟bVIedy#I4j?/QΚ'=rzY9[0}3PX;[vrq9n @NsO#8ܕ},G^p:z@u ;|s*qԚ~"Ҭ2'<'>xcT(@9?:؆2BƃW+0 ʜws֚Bq93Hv|i7N=}PHVOMe(9@IH w6FOGH"&ٜw_*9#:0h֘d`LG40$xGN}4sIp;F87ϯzSY[;CqՀKFNHunx.r@$xƣays^R)ai.pAy8˿OPP0 = :ji PCu##SA~<G';r>cׯE# >RA?VrAay>?c'Ӷ( <){~" mބqHBj =t@R0W@ԝy''=}OFxdq_?)X -zcҤ'#JhzdmsϷ1\oɎ1=ut8 gA Rg8#4o9'9\Uv;z?.rGLNn|p9>@)"7'6`ر}5Rwqd޾c+|l|1א3߄)\ e}q:F'Df88_A^*B0rIWL^qcz|;8b)Ar2rqQ|[1}*U&vg>"̮a cynʻ/LNvOS\g5H9onJ uJ[#ל(zwok!{N1瞕㟳7[hw,{}s+`N=g&ބmh$cɨ,0r;du_J OܓMx#ҤDy霌c*0 yoҤhs߿XfPK OJa=3N#JFXFKHh+sӵ(~Oq~tI Ho@ FXq׵0=G=y)]N?! Hޭ'Rƈv$~\/w(_H2{`<{S ]L#8SF8w'z9''JKv/C@Aצ>Iswޝx A@ XK{ڝQxMG'#g)I Hlg+xPOId:uXJ!ӿ &NqI?;iA8#֗ 4#=)T|{\Ԝ$:c㞕 10=`n$瞸?O~a`s8_QQ+gw <_N{F?\ƋJTuE;vTNF9 &p0F>Iװ]W'۷s2_zU FHH8yMX^;O$4lVZ?Ղ^gv$''p+_W2T`83^tw!' zhG`o)RE d ~:s_=/{,7$rW1ڜ1A { bX`d`ib1G<Ԥb4+\}j(ĉHӷ֧f\ex=2 Vp|q$>=$l\?<מZYp8{ҷIFy{.&t'vAkumң,ÆzFz8䞜{鎼Rq8Ԟ}rA?+8$d׀}G?ʢb|Nq@=Ol>l;99' ٶ ԬX8x'P N߈ }y:}i d1##xM+qހ#4Ϳxcӊnj:٦/<דք#n;d_.Fxp9)psqM`0sҫgҚ[vA1+pH;x=u#`1i˷[x4ЎNEO( y~Fn9i_u9'InF@~/ͅ`3Ӝ~}iz ;ZpgM>4А;Srrz~U&p1vAҀv1sԏ'@>`8x#'GNWc\ti~@R3_q!듞Enq?NzUk6W8$t<}1E Jet۟~ֻ۳#qYJ 'RyV!`~I8RhGl:3֓=Lh9n TP1w?J::gwZA0qsUn i3`|qsrq tR#w8WƽF2B?_M7w#<ºq?"/S;~=S.{Jq@Jo# q'ҼtN_#4ÐH9qJuQkqu*tC-̚ELd#=ϭpS4UW#s6e@x? [!Xp稤y(#z[sc8ۊ8ۓ9$~r ;LoǩǭH03pG_~ݪʠ:pshqd'3V˖#^2-y'kĿg3TST]$8?^y9iVFv( <v9ҩ9>8ۮ+ FrLg 6 qcqJyt"lpXL?J8#nrK OFðs߯N=r#gק֙'~/7|rrp1ߚaT`` qmH=:P' }zSR=x㷯&Mx8=F\vqL=jv0>E4czs֠W8ϯlRm$w>(tdsM#-}(Ʃ8_瞸(H$8#xo~J0 ?;1֤:ҐHR^{`@ `H=s2}=1`?>t0|G柒'#Fx~_83hN\ҩ㞝zS>R$"I'$"7{$pN9㌐8Þ^=𞧸I=[Ҥc0=QH0H@1{(jr@?:dc\?lCg8ϧLӗ*1XrQcLvW[k[q<:k2Idrg=Ǩϧjle <Ѱzˉy&92?ery'p3}kZՎHV$ @VE7#c/֥Ա!2NǏ¼Ğ;@Z7$ =Ogx/~KT/g\/zqCE_.IiF$$~8$d֭>$fT t#[1Y1SB=0#=x,Tqn1(e%C{t{{#{VrD)[ `2IA`2=p1Sǧx_c+cN~%yv9q1ϔ֝g)=A ن>`I8+tYONV͘` uןj5a{*Drw'PGaBfmI W=_GUQF;1T+> c߮}xKrt$"5 +'v+F͓۟p+:K7px'לq(3teV#^aڸ)7 pQWC4Y "?H۹霆J./dSrz9<'lJ9׿j})L#mK[?JI䜊,;zsUsP7wR9"h#&@ ר9LvAV 8QCen wTp9d$ ~;b&u8GSTe(Oo֭iڞ\}F9#$ }:sLd)d/LԶe8]YJ5D7J>}}+jX.IasҼA@m{Ů} pYHG<ǭ4.NB? ]̌Sh91ucpHyUGlç?gI7]x,y+t;ȉ*:yf*Mnw.V"C[9~]~giڛFdڲ!B}kG OO҃"<˜ oj{dqtøy>5py)9;:ǵ2S9+܎> !q}*1z=.I R!nJ&֑2o˃ʒǯSqH$N=z)0IXu`֓i.n4nr@<( cǃwoPG:i8Sp Þ9'vhPzw?:d#?208:psQ<1sH9$$}y魷Zx8$qG $O_QBq Z;U=On=}>q8ЏK$cin??SAV#Z^O,})<Ӿ(IUƕ8=iw|p)*Av*RS%G8@BN=OWp1ȫ9c~<3LRQ{`ف!ڒH$1V?!9zg֪6$gg֮(!sOLԢ4e?=RW85u>E zR嶪y=9uAӿ?Ψ_"@ &L/@#+ ]+d |yA^pZyP޾kgUy>N+":r A\qSޚ=)Ł;H^3q 9?Q\5LL`s\$̜A{57v#(y:}Ӄ9E-k_pȇM%2㞘2+vlAZKbM0F۶=';0>RGLW5@a8:N|'\\ޢe[GO0Lqlp;S[) l~mVFk_0ry / [Onq"5y;sN\ۆ ݞ3Qn^Hl3ڝ7t~48~k18?قq۟ZVOf \tl0V9F9~>޴@ߨw0rWSg)ZW8=GB8lҘgy 3qHN2[*Ha“n7 z}}ހ 8*sܓ''?ӽ&~U8#zT4;se~olEG8v}Nz3OG3 ?⤤8r~'p>܃Y'g?p8^Y'}84 L-OJAÐ#=~@c= a$@: \my9p1Ϯ}9#׀{z RIN:47er{uj0t率Z"9s~Jq.zIm y=xH8Q8r8~08=Aր`w:?OZCssG8=xӠmX)Ƕ,U}[(:C`٘qט^rؤ~< rO[-$[Ty:U=IzkxY,XI>nb(.6tˆ ϳv7 qʴa:A҉v>kfҿ =?63JsrzOZLLK%1;J$=Ǧ+~[`bުw'#6:>k0 83kvtBm 18?JH rxx ڍ^\1VĈI19IN P&1T8$vҮg|x)V erGin2${AԠg}`w 88H3M^!GaQFy=AJ&|VRFj! >֩s5s,|<PۀR8U ˍ\u,LNrֳo ɼvn3hsȬTOڷ0+~\O"\7uLi\SːiA#۹UGǧ]S϶;a=FqתG*Aڶ/-7dgfdrG# .a( xH,=3t?.}+CiI:S&k.3A*?\jF >Sw8\.̜ VkjFI)wH`6 9T8%Ly?OJjSBM,4uka -zAÞ1SײOFX$k^腮#_: 6sѽ\1#ݚKnF}4+=O nW2 IVC<{k\矖0tә^1nK1+=^Eep&݆2_#=J.&fI8$O񨥐SBLdYprܐ1+ Hn x}'8T srs~n?J{7 t=}f3HCoƂ[p1ҭ0T *9җ26+;ژA)2F@#۟SNt!p9Tg=Npy(<GU;w>'0ǧ?_I8p_06păש0a#M+1;}ibp= aG#=p)}=AH,zvcp/U6p+sfJ\އ?ZVpyVqa9:{gFۏ'<Җ$,R=qINN9>ñgod>w~ZvA=)G AA@& Ȧ67F};~@R{zQ s*MAz`zTW;ypY2ĎÞ0NO19$ 2ts>+1RIRN8iMM,r6n[Xmק JIH''pstQd u$<}b\'d>q `\c4c21=wrs=M#z Lt9Q:?#:r3|Slƣ2by_1t{Wkণ $<+J*5 +-89@JUQ{w_`{JiĜ?n+ ޼g֧p6`>~JC^\Jq<@ǷNb9o=>psJ=s}ccm(c U-.8yPO "|ryX@>1?vse!0#z}i+q?Su1I2xCFէijH-\~s*;K.K(Pq&eHFI>urƠbebOwp?] 6ķ<2=)HOXB6{WAqoYp9}OoZPF>ND`3p8 ޺1@SL,~'<cYtk;k8M1G_JTpߟz w'B|=1(;#L*E7`2;cޣL3NUUAAzvYL)1j"m/O|u:F3ۀ+H۸F -q=?Ze$^tmnϽRhդ@9VD*G嚩+ru2OSJ`pp8Gqm.TH8x<$<Q/ʊdRێB>)e(YG^YRD=TL8qs9`IFjh~~\BUf|`>Vn9U$%_a~b8~Q25+/>6<_2xrFp/Ya⾯M*:⹭gD%Tsz[x:±jEpѬ#b?1#¯@c_޼ 9n8bڸ+i<׭ʧīJ_5j~:L2 mti+eǨePѤgq}mu w098.'sFu= @^}ӈ;yRF1FZT ʃH~5I¤y޽9yFOI\;p@OqHK?\Âd;:?*F3Rp|q08)'$d'8F'\֤ r8,AH8hb7o^1P?to_OWU#|c9?8y5lALST\OΚOR<Lm`cqrzuۓb$`qHH8ޑX# ~8~=4r~'x"03:PH?)c \uL)UA'OsR<>/#zv$@kaяқ)Mh0uս$N6ڪV]][ A&c<}^M9xHOqx `yvxt ǷU.3Ӧ}2}jw(Ӫ94K>\P~7ShXm_@x%:oÜ^ HźmIҽ!Y}s]X e{?ʅPĎxcg<;d@0y8'|Hp9:sHX$qr0zzz_#NI>x(O8qOڽ}t@ 0`C#"U9=:ޛҥ\4[vz]1ڞ "r1ߵ13p?N]S;@0| zqPgޛ*ס#?j@lnڡ8U3=iNH #rq՜v>Qa|A\2=1OwzfoDpB`}oJ|Zҿ~R-L2 s/u-k~>qarrzu=OJcKwJƹhOֺYٸ qJ R*}Pz <8ǧO*bzm 1ߡ'@pFzgSH艾fXW뚍DDѡ䱓hʯ\Vgy9*XF=kyծ-'*F2OnOj洡vtrjK`yU^wH?^0 ڀ`1$+ӞA8;G#ډhz>$eE$s]kb+8 uW %B׷HG2B.GN%ps9S?OJ#0E8׌r{%[ '{bXT/̣ǭa&wӉf9Lm RH9qDxgX~"8TpFOeH؂Q&tEmR ?^mW_qkeb>Q+zc6x=JIsaS^ U_[ &ON+6Epnǽr[8]0x5Չ-v c֠TT#օXI8#ҟ,22F}:d_*Rqs>g02YD&E RE߻*&nr?*a P_'fx&&S#6ŝĠ__Zo-\S<S]Vp"? gATȠPs)\V]KSp:U9aV c9淤"S݌l,# &e(d3rH?T=p&fx#V,*Xi4s%V:Uwv:sձ2YNIģCAGgd)I"0ehGڥI;AsN,_4rWo$7O'԰%,wI曻?)8R@_j<#;dwm<4́wz{m N:BsLgN3׎siL3\}Oʀ #8R=;88lJn'Ͽ4ޕ\OJKYos@%9SƓ9_&:p@q02Z^0FA(=*)ձDZJ@8u&Tqp9?΁3pÑ?ƴ42݉m} w?SU!7eӌ(%#G #L2Oi$r“AcYN9?Jp[m=?QV G^9!'w>g_N ҽ1<18ԛoS s^QR1[t4;OOQ}F 89=yZ`۴0vJo [|7vWS6F~d\=딿#̹sֺo :,E!Ҷ{ &Kg'9O$';c8aqx#.O?tqJ3zqޢi[냌PJb"W*9u^W|4 9eA8%C^|a}𪯸*F?G8?Ӄ;THF鎼v{29=} CCdr3׎8M*t#:sT[J~Sԑ>~m9<1z:uJq8Ҍb>zh Б)`nQq}# xxt7 0a\flnqk~dB[Vj((S5m8>kU~IU]>̕D A翡5۰0 )h+cn89?C+n@gtl~HC3Zq*F.P0=S.@l)NnӞ*ᑤqާm CgDbYDCu-!2:vVΟidT)4!$~}>Tf;7@Q呀#'=}1HԖ$pg| }}Vιv:=+z8aM1(L 'צ\XNK$rf!bU#Jcn 8<4L$`?Z|. csO/;돦j1o"Y I32x Oݒ(3yqzɖ=,;LHnN;Ug.J^G#irƃm.+O?'TG=yu{X`g+Zs0 -sNkM| G?<#yYHP8|C7 #|ǧ"wV /#<,23' }zWBؚVfxoTV7 I'kܥAanIbsFrLcnq daQFNF3=8'z?}8KA6~8H ~ԜXgQ`F1w):`FF$Ғ'{rM40 O׹qz8Pp`NFOn(f9 1Ma+鞧#<ҩ 23U4;8{R8=:sz~?(9~ = $]ǩg9Jw$c[dsM͐qz/L{V?܆`dc9$K߀#"'9ST7]@0R 8A'Iv>DCH :Ӱz)-[#cfp?!aǏL=sQH:Hp=Oւ sSb|܆N})Of;z7x*s8b Oӊ>`ŽA9=9`A8s܏ʣ Fp8>:dt8oMc8\~nMaRÌI$<0==N;Ou)ь`{ߎ*78Қ$`i\sz{z\ sӧ׮)2Ki>=q@6I nH8=OGtדJH !I=z}hhH#9rNh 3A8>cpz a cc `w? @ R^SNFN~ц8tn}?!i۱R1ׯz =N'$@{t ~P0@H'A= qN#s=3 8=)KpǨހtL3< G>#N:PrzNlX>^v8<z:e2T@HsqU"Nq_M#u%q"}y?1Xzd]A=m?+Aܞ5^&ֶb 3V܌fʌG5!j^.<-#_xw dr^'$'9 {O$G8ǥ|cGw)J+I.  {zW ꚬuCA'8r+o+rà_ WJREĉe<;k|4n s>N _SԚ/L#C׭s>b3Ɯ_Os^in8v{jV5trdN3Nz Doׯ~Օe0D1.CxǷt !n`F?6{T#$~\[UT=3Cy7cMa9 =:ކd0ǟgTbe"PNNzqkfdmIzյ,LsO3܀2v?ZΈ@,Bqn c Iާ"1#۽O1ҠJ g҉4їqn{v,aq늼<ƙu950J(gByXxK~u(;TdvN<<|OvH6! -L(;gLcF֒<r2#Ϛ o.++0O }1*}@Q1v4rHǛL|7w SO r`?:HAГ 1M"dUfG:yf'R8?^:4(yPoc5#=dGdtMaګ\IWںaq 泡vɅ'H{`d֕ܮp'5̬bd}qڒki,*# J}nƠTZX7pO™%!co x=ZF@=S93@Ua3J  Ӟ+tGc4L.: H`vAA)\mfa',UZNsv3ffUsozh1Ё:cϿheHSGd'b+;p$~+Ǟ9fS9YNpsǵeKʕk:BI\eqNO}kdrT:0+ߟO]Er D3;㡯US<),"+(Rc us,IA>zw8cGjۀqs½6cPlu+ 7$r;ԯ"gx!xŽ|Ju 8ʮmpz1ҽEdܧ=+Ȝy[FC7r=ƚBH8cIcqzCקsPj9hn2ÜiNdc'L:f'i N3sMsޙ#Ip}ZIIAnN}{i<jn3I4SO#րHH21S~NG'\`\g:#7sLぞ 7cB öp}=jN'osz\a=;SCŀ{i9#wҚPYF>_slv4183}x$s*)[08?) zzy'?7DϰQ Fq==x~^ND;l] rn~ SZ gpFOiF <CQ6~ ϮILт6:V: t+D!{Xy%Ձ'VD6s3UqY@SkY M=kϴ)vVRlHss]zAǝUQJX{TY,ۧˏ!a߱\dtz~J`iO#*~|:u;ֲj/+zqk-BGˌ={6(F~Gҵ*]d+9WCIOSPr1J@͜9=( v=8<`?ʲh$}zUƸA{UTd1=r?q #OcZ9{ K}JP$Yt(:W@q׿ֲrʀ(AЏWГa98׭'N3? Vns v'O@e=L*Ued(>$:4l$ eyxׯFĒ7^iYc?ŌqGi qңr3?ϥ)azs'n[@Ls{=ʓ'HG ӷAz~>D;~&qǨǵ&=Ґ ~Fpܜʛch6_SrC q p`zg)7<)NF݅ARn?*`r{ҍzTr0Gz~9A;Z 2@j6Ӧ3S|$}*3Мށ@*zׯn)#@c΂ܖv.qIۧJ黁n1׏oi`cMp18ۑLm&I?J@Y[ y $#>=黾oAt;ӷqր'3ۜP9qN-8~4М``t4<g8df.9ZiJFOEV :wkHG91{nܣ8!x_ƺe$ Cؓ'}O]J-WJРbkꥐFy?kjR Gd־y( g8C'_Qz|]1y# 57í jZ]\gr8ҽ'$4 d+^XI\[yŽ=uN4mB7Giv0V=Ͻt#2g[yمK8g:lfq)u#2UqeV,-A9zWQYÒ1'3{,Z.\8HjTf'j8ҳ|R:}k^1͞:bY+!*Tүj\ iB=y+ɸ&_8)5ͦjvwb8oB}>o26Iun*:nS4'=r09җ 'Oqlrs֙>Q{v␸.7 08znFԷ^JrGaSOʹJ`) ׿\ ' r2N=$qg HpyQ£?IߑSp$8qjF#'?1Q;0ly{SlHO(r3c5N@2TϥMolc1ĎIMES2xk2J8;Gs&@L>)02d-Bx-#ZTMb+[7%s},vIW/q|ٹNW;H:qUˌǂs?NT3 `SM! sN)~\pǓ֑v9Oj"9|u=q)G$lS89 )}8d`t#2@<zk>j%_muʐ@=={=RO;9<1RcP|?ǭ|҂FJ~$u^If`v ~f/̌d#یS$þ#s;gǸ ~*e\d?BkN.#rhWG=p@=pyUµwO?O7{V"6h'g~#h[j~*&R0#sp<Ҿ}8ׇ\iI'&Y,H8_jM >U1]XXksr@>wzV彺 0q5r %Wn{z]O)yy2={OӾQv's֭Enƌv$z ̱MJOrzup1ҹ{b%;#Co8o!p8Qʮk >_Fj]B  {I?t{f(TdWaiy< 73dLd׶jcoλ'K[Iuyv1K2>FGJVEkSJH=zsTnw9mmI2k1@Z P8 qpdj[_{B4mM:'Lg>.嵣PvfJ.@`f4684j:g=? mB-V܌f 20sUߵm8]ISiWv3Y[˙ 3= Jw18]BÓ됞̋<`?;F//Nk Q#*zgB08.ǻ+?+|#q׸ *\#$~jG4#?Hg#i1NHztǵG3] |[v8ldki>|NL[VrWBR} pF:cT,'<׫G xR8E8[V?)h<%88M7J]LjO=)K.G^w_ٗ;D? %$0?='\-8Л>SHrI89NzsZ]?dL~y^ns! "N#-)?j;ϙB'>+8O +W"97s'?TV+.K*nH8Kpc@@$t_[kdE9)3έ\hIL$ϯRTV'nNQWw:cVhfPS,ھȓ$$7esTQZۈ#d\`Sӯv4]ϑZNv=? sx3h (Wn>`c6aaR?ﺟP|Uy x#_}x[0*\x͚1k}>jcĺ63VCk%Dn斔嶟&@^=]_->!'!?^_oK^EVSkR;Ga_vŰN-?'‹|Tz7`|g+52⋼჏қ u`_ aưΫGGbFH,p`zW>bOA<N?|Ux3N?JD~t[@X.j_$'fonϋorqqoi{8K/HcZ&{Chn9"> +QOFd7 vg#ھh3-xg`RYʐi}Fa]w>\Bz n>W3&x+i7{>SԗsNI'@b::ujad@RßZ'%B]XOpGZXZ얚|[8'n}>|ܟ21cCb) `}=8Z>r?sM99$gF}+K*LzUfqC=XGէ9$?*3}^'yѡd=sY}Q =*Ùn,F6xnqS p}»|Q_)<=;9#kvO v ϰ]~>'9ǥv|3<>$GIZP?drrF1Ӛ]/Lu8n?fڣWvտzz 6ރ<Ƒ|,ؾ^'IzzCX#eʜүE}Jx2{g~]@9GGSg`1ɫ2< VVF?:"7}h${11VlCme^VV 1EA6O#{l +AU.9V;uI-RutpGº 7 TnHzPfp:ylu <."$>cۯ ?zl&v`z^j{a })1'-Ec7 #AYq, ;GFZ6x9zUYKf0ƛ9sw 4,=07wW:c: nY0 {s~$YH3~i 5tg?s#+,*ƞH8YrA=3]9jpz!c#pT}׭aS{]m5?:QOڑ7ې t=9һ`y"y[7LuHՙrNkuY<;} ѳC"x?UKW^Zg2(9$r;gf ,v.'%CE7Gߟ֕T?Bt}a Fny\0V;q߷Ҽw.s7/dlI^ֽx3 l9FzW(g|]^hj `Vr rp3}u? lN5;BL FbgAg]I&a"1#zJr4Iy5/z`Y? }? xgL˵`·392Eaeqv-# к>?WKshElF0S#x}cRmP{Y R:¡wwlR`qh!|ja\iݝ ;{ڜ#' y ?4J=l`(u7w7vS =&֝s)za` AL֋3'E)y54J]iۉ9sNxpF{æri 4ހrNiJq9'[9?ړ7צqړ$C;CG4 qҐUqO_֥M`%֣Gbgq+zP*N }>#in=y߿zY:,;TJI֋;NH* U_nԹ}h-V}Hg­Xs 3 WRpGjimp|8YW6\͔]9Mf?UwDM +ӉF8 g@$Ho.x;irsj09d'"} yJ/4^}?4[Yk O-Ocҟ'U=z(Ӱ̩|;Yf,w?/1lO?J?ElRq]o_ e1gj_~bݩR~eU+ ׭=YOJV9==;;xu@'83WOve.tÚ]CKd-sivOS)~d3G򯸯j,jDAͥn_#?Z͟_Y#|"y. xeݟ4zRtavDk>W8 < :A+ͤ|`RaYv?c,vh0 Z!:aHzFfv䑜1z׶oVe mbs zW|WD0Cubrp>t_J;HmTWHx܎v90y Ð1@O^9U WgzRbfUih"}j+NHrsN26#PZ-!xOaI|TNp; LudCP)+t V(1Mg#R?͹wqxNa4޸㹥`q R2?/;>ivj|04sڔFIrG@49n9 `v=J@r: KOJzv:N</9ɣ}94 `8$qtԇiF})rr^2iH8GzR6'o>@8=:)O gZfi1Nn)q۶3AK9֗C`: ##=+:d889=i?h85hZLVRl?DsXԷI*2>72AP4O)}i8\,5{q_SH*R$~w 篭4g< T3PqsP @ ^>{:tkcGHyjXFN=9OO| BOGJGb?*Nm=ͻ_Zyn-vT\>' kFL贏_t>7 O@;Ko-T,GbM}|D 4rGpFA |!g!}N+CReH'm&VA mW_?NMU<i$Q$\M4sn Ìg*H浭Mt>lt ,zdW[qK?!\,r6c]|M{g=}:V}'eWcy8 ͵ ~T܋EWqn0=cU{L"jduś&M]pVd |ZU$':!wˑy;fRdrFN[q@A'N8\18ǽTms=3޺m2_qUeNx8b0 }MM9R[w8qTSzh@ɅExǷ֣arorir#5ڂ A$sN:}>p3];Xr@8Ǹ6 bu =G\tZ(Ҧqcu:Z8Fvdy%!oi}y=M )͐*@8eN\²0]Y/=~ICStQsq'/L7ShR5R_y?ʙn*3ڇ!(^;~4M!9'8ZQ'x9lU$',ʠN="]8'$m~y`:rWؔ48qN:M:-5eHWF<ɔ;rrg@e,[+ԫu?pWׯn>8#i2)ZZV`rWy}&Y2|<Q{*IV̭QB>_R~Ѐ,{uWK|m2C},Y<!c,ro4_x2c"T%kR|5~Qn"t!`/Ό& NMgQ;"!I-=kK4tTUE{4MzogLr9qR1O;nuDCJ2I8+?i'߂ v0t{}^q1yFsNUʢ;-/Ŕp]C,a^QOS<3:\ Vxx3ȱ;I~?t%VHEGjtvZ^70n^L w` D!PYr*ε*nSje9.[(`tԛRm[DGҟ5_>+Dm_naL-6InҽCxGZnuKHnLAlT6?;>QE}wmE?WkbUʤX!P0q9=_S_4|+|E=E ]:y*ש- 5)7۲5?^R[;pMeن"o*pN>MsD(   5K-q%Ӝ9) GcVtz\`s*u2F;}5}֕[kw.5Kcltǜ9أcYo/׎4K4GK$hM1Ӟ񟁴ן$X:Р"q8(7G[hQQ(TEBڧ ZUd~fU|=<⧉~_<>=ve \X\Qv;## ^y}̗VE4t@Ĝޯ 4gXuj)R*Lv$sAsS4A5>GqOʤ+`\wݷLc4șrrN1@oC&m!$Jh3Ҁ\zT3ڗϨHG˻݃8 E`\p;R(oO z)BrDpyMɩ#4=+4z/#u3Jh׊iQ`#<3~JLxZA5+Bɥ+=y4)nj>wgi!3_@N+A)Is<:5JJ7q_=1I:Qb_X(FqZ"vāHk[,rlT6E=2Dm=~E???Z45[ D*C`7 9h ǿKi&<9r,Z7̬٘0c$N8\e'$W3OeYIնN=ӢIU( R@#JV4ZN"F=BUI$s#6*q= Fk~..|XIѨw|)#zw jqhb V"힕(r3Cp<k[^GM*%z7ck+PҽB2޵xDbxGPڹ*@O#TSHOR`*Z3щȁ ʵr铊`6 |:WX۶[FIs]z~$0{6pe*p 9Ͽjt6++r H>涗,!Aޜ t`b8>yZ:z'ǂ˴}If&'pF=8hnKc*Wi?͙Iz"gI[1\Qf[)$HVя͎2N3\ w t)pXI'g d''z{ņqv:VBmNw?Zt99`}q4s&Q W -JS7F|/{;O*xO@>\goĚ>Eƥ pFO0J7~wwp1V4Fx'{Uݢ8> 1'q ScpK2H*C \N93-N oTFb Il>o0>xŗjz mb0N=DݎPXIpqvҫdfR(7 ;`:VdQ'£Zh&.NzUynRT/ںI( 'A[`HT$߯ 1=ҧ}3{Ը g"FO6v~g3+CStf&His8Ց5I,ɢR;kxqӒz6>Xɍ2H y#Dk)>>U۸dOK̠@jXV 8 ;H$O+lִ䴒xȥo?0K+ufd'cR.wBQ}:j.}HU.cxUG8矩\gуJ;HY#R@_̏.0O_4pKTp1Ӟ wzxTc#nW)7dti2)Gڦe^Tq?_z$i s)NLY]BH``W~F z'c<6dsOQsIQ32tv=2k `Ul`y뻱kԷM\ج@\r1} t5Q5pb.L> OSo²7ʳ w 5[카6o`q0d(I$̃wtv=k9$kv.eY"+ + dw|8DQBT Anmdy>W3nr+ ]A< c=EUGxe}Џ[:bq}4/˹{z<ݸzfqޞǥ)8̈- upgL7fo-&f#+7jgMౢ(մil.ewAEp4:-G}?}ׇ9 k ؗh5(ۙZ/1\"Olۣu t*#VG Dֱ;QI'̟ Wg_-~\[&;ky `+>th%,sBZko3ujh'wn¤`!ҭNN[oL6T ʹMOe&`ʎW"4?d-b>"%HǨY?gM{&NסKo$FX6dvb^Ʒ W[kF.nJo˳z'npib]W*u#088cV1J|zys^p*S^=J}{ILd2|5?_ ;5«+ρR|Ԥ$ƚ#.gۦkԩRևy^_b0iiſu$ӹ?E@-䁍ؐ͒u35߂O5 5H^lٜ/!taӌ^3q8.OE^=? v dqަʎܚaG^ @0vJNCޔD'v,\՜Q` );=Fsqx&y!<8#\g'R ?ɦw57rs c֗(9=:rc S`Fӂ~=G)0j`<=)ws􃞦ǚM8Gz@6Ɓ1?QY#ZxiSւpڎ̹ ՝\N en?[9ʹK]>(c=D `稪. >+tE-jPz5;467- {F'M~VeX 8?||U5#ڌnum^Dt ?6n` lLWR#o$0s]Ԇ85"oݜ}aʱ0\[0lO 65KmEcڳ}Q'!`9=G"c\yt!IxM>XN6:Fƞ 0vJBdGpX9O R߭u6wIo(ᑗ) J+{G_ſ$ԭwMikye 5;sΔfv> A1?< iRxu},r:[dRH yBx$ ɯ5/փ;~.4|[&,q2 2y2)ʼx l!q⍭ƏZI?h~RK}]$ܛB%HUc!Q4Ϳ/|Qk i^-`Y#Aݒ6Xt i5G1ӷ*g'Zg|<*=)by<:pi۲0|>1gm1lu؅7Ȳp펵ʅ hnoQY~;!$2 19[B2[#hZֲ籁Z|9^UʲFޣ8ȯ6Ɏ>+Hak w:uQ,ytV24 5XholvAW̋cmG~zclEjD9`E*#'qd2diW-0u4Nǐ|0AOdS_:Y+h-HU=G> RHn\SB۳eU$8TSc#'~rO<|DѢRA鞢ŵ qF +&n\9쿘H9 82fJ#܎Z ] ]DTfSh`3jMZ[O&FʷO´Ⱂ S1CW$tTKwc5cxBI*U0 CeYCt+ͮ|m,r}URBȯXuj;o2dׂVn2x;9qdAX7t `c>yl' >C $wfUv#Yǜjs+*###kҵDGf I ?#_4g NKќK:<ړ9O0q#SI_v$d00d}jQ9k2rӧy*4ǖ1?Npʓ~`O1VDK#!nw*z $;9^G+F;wXܬ@Xi2$"Ň܏\ USs}sKZ41TeNN+ S/C#F"Hy7/=?.kҼC֟o%D+I*xapok2Tt B5 U-$ V@KI+2y_6YmrïPq' dNHxvy=(_֌q]F"G9iN4ߧ?Z]N۞*''Q֘T+9b9K?`ϧpsLwzۊ\nހlc7smixus iwɦ32185^@ ,cG<)}i =2~OZa9Ƒ+4_> 89҅#*P9#RCQZ4m[i O:)8{Pv*><FR7NL<?ZPx:?Ο=JMoQ@Nh#i;FQv4]UYGVAN rqAho[qV5K&ZՎ\ W r0{s@DI"n-H"c/^V6qZ+Vx:7B r:ΙyixvhIp>WٖX(x$}yx _7:=ckWqu(d]Ѻ0x$1{!om<1u$LMw'ۛ؟4o/$U9pKLg Smg6lVQ28DSusھj^o&-OþVѮd1ukyJȨF :UoyƯkt]>Ѯq7QN1ruc_nprOʾ.ŝK/./x?ῂ$ψTǻ쭗g#*DE 78>/7|7@^OxD~N;G x>Md am9b@v- Ү >[ҹ-3SB[=ךl"DQ%ے{t\7+mavkK= ;9?xӕ%J*GyBA J ώ8Eun>xOoU-n-28 Y 2x{״EA'񸁾ˠڵ~wVJG9>Nn<$C!lt+Nd*] 7!!GszxMɆ%`{zojQD.q-BcSpZUf/ҵm%قOCֹIkFVWb''z OXS|O9JTκuJ4Yc4*e9>✴O˴O_Jὰkv_?ҧ*a..?vIϨ5j9$ v<~Una*,c$Tq#+(H8.KsaKQOs!_vӒ@ޥ)Ifo׊8#=.Rԍ+{F %@_Jl&#Qm3 VBP!l1?xGn+ჅU<T:o}'VUܲoM2QZgT_Jt:ʈřprx~:M 1§7zzZڒ@O GЃTm` b_:g90Bዜp)#Ԧ fnE6(&dUF;GKYf2<60q^EƑg>`vzcιB%IܓpZnZjEFtip4lAU'޵ F H9<%( rN8cIuˎM0#[c{j ymc>)svjs'1׎ɻihujY$7b0r# cM nuxRS;X@[ 0s\&/L\9rO@3<0 glc2 iRHw-خ<긶: OڍԭdMHwg~>luszuXud?$ƼZ6б4~#}N[I9<5=l\3^!RI n7xNS8 N$HP:'sU cw;6:wwoѦ'9@ Vv׼0F\gdklA7R$qX{tPj#(vEME bS.g|eq28QֲJ 7  @ß1uā K62FL3FZ*͝ŲGQʆk91,9#m;Qfqܑ̻GmR=6Km<@]#vdi֬ב[ʳE+LTS t>Ք|;>Fqڽӣy~DT uQN1$Nݏ>P^}QdP\~>F'%rX䌓<٣40OrhLӾ TaI}0Icum ѹ;8{Z [*}$*$6ޛ885## sx8o~٭Y.HuiIvA&@T. d_>cSe|"_-̘Mp (䎵x_VWQ\3$nQ3Њteo-QFHb{uRy׎nm ·D'4Y#C8JS*?\` 7z5Ȼ7VҸ$-ĻA=xpsiasֿ4rQJcXD5cƣ,MȤ ;f[ҫ=G %hQ)b (EQJAfɧ1J&:~(9sH 6S=<=鬼;Ըh ֋#''Rx0Ƞ9P@gӭ?p{Up`Rdcg#)Iq#2jp^9Qr~B Wg0 b5F=Mu@=:)?JF3WkIdDEfbxrhsH:c_ORo>uG->>lqo,1\JN$meYXpA 8+ cwJx8=F0sޚy=y`ǧzr R5B2r1KӟIgRh9dJ0qSz'(@pq`&Kg惎@?7z{GzUNZJn#H+xip}F7 83G~.2rOJB{Td`KdSp3( Rֲ|Aop@#; *}sYu$l薭\x&1C1yQ]"A8|D1؏^ c pHiz3_>5U#|Y)m _sRi^1d$Hgﳦ~^eNBs9ء̸l)I&\jzD%ʃ+zncCJGtD\d|LWE2aX`U^tvY. 8ڳf# ;$λ/& NC+H15vkt<"=UOG|`S*]J L@8֜,hDx9X.00Ǔ|cZxu>*DOO_i6Shj'f@?ҿ6mdd+meq$т'L~|שZbf"/(_ƳtK=Y%oFA@*o56d}He$瞼k-!R"ČPC\);-8ɕLyvW]iGHW ӯ#zq rXH;HKpJQP=8^S]BV3Ӄ5iRO. F2Sƅtd HgN+.`κ{ hNN\gxkdch3DSTh&{zScKRᛨ-R@Bw*8W+K<(r#wRR,@FA$%I(F2;gBiNrO~9 [ "*ckG5fڶucr̢DNT<^}x2N^?tII?*tu&]ZJcӀ+ *[TY0|۶y vjANL1$@p}N9ֽC춺N ۬C  wV%:-!lj~?ʻ]E4۞ 3&J^чSRtNdN+jt"%  ){+٬H.xx_˚\pfca+>{|Rs2sPKqpxg9LWK^YYQ'}=Ku}BH]氕sCqS2h8d_!5IZO})$We+s;&]3`E׈5Q?-ڂ0fEWF^1QktK{*ձnvFF;fs7|KrQN1^2=K<ϴpAFѲ0zar­ 4F`nB/|t޷4aGt?N֧Yus"*AE}OZMχn .%$?_$gpss8~E)I'_*e!ljӴ29m{;W_;(ܳj:pm(1P)I$~4c)SF|En=m_l_9@1=2V'x'zQ>g4w/0Rg ztuXoOgo[,umcڋaiHT.c[=}`_o(OaOT{_wC|nt_Яh|…P?:#gިkLJ<-`ڗ[]"FLS$)PzIƃЁ_?y'f~,u]N7hE'ڇ_ǫxSU֬dZLFHM[%9#5xu)4L/ax.nE2 V :Vsx_Vmcym%Y\ ,AZ=Jb<dY>(oūx],IH#ivجw\Þ 񾏮jkey4qc{*)$2GL^ͽPw=9)9 Z>#IaNM[g4ZJ#k&x)>|Jw>4oǬ薳m%j<؀.@SNvsLg'5Z~1d~IaA{V~_k:핗dby+o & m :2:.í)_Qo KWZ۾ǖL"k~~?_}I4?kc|ats#1|Qόx[hepФe.xI㹾qAN?oO7W3MVd4&6:2GPA~_o5t{/ &f\iNi&>ڤ* 1XȓʡH:22>9gk]c|eGl;xwv }+Zw!g=pN~wtsր3_'~~{sx+=~|Z}S᧊t[Gõ+!ur"h\x>Ko4{SHnh1nxYѼE_<֬ J֓2܀ {f;3uO#kJ9c"#4ݳҤeP2)3Ґ 9=x4tr=3LgZ`{R0:@7<6{w98[ g88u'NGƂddsJ hLsiO<AOަ`#y]Ƌx' á<0=,-KU9S@'<|]keKk:wuH{|oī+aS⋿j?l=O7͝bۖf-$+>Ȯ'ƾ*y6uk2]YÂ0 VXgR0zժܣ<7?K OD 6Ɓig$bǑQ̍ο4m ?o Bw^lMyfJU!>ijHiŻʒ+5n%G5 >5N>UusC֠NxAW3ko%ԸXv)OHkM=~`H/RxS*P-4m9O#q'VjnG1sЪN+I\fGv!RX<[fRMѭZ]VYʱ :|[ K)K#P@qJ?f]SP # $6#A=y>dJ8Crj}7Xh,߲_%Q#z㚃Zo"tREaE=>8UP))r*Ž`fXԠbvgOP>?5K[Pcr=~~afwyn$m?.׉X&!xPPaT}WHIWy/!mGzT5*d< Eji~%"_( P2 ϥVS}qi 'zlP~FV%nxi-͡J= 6wVeQ:݇=qֻ W hz6rN N?y[j26n4A~C6Z=>f^㞘Fǃhڕ7@F 0+㲒KxcBc9Ͷ[D*=wE)Ϯ=} k[ Vr!93һdӭyq{)xY2>/p}nQȮtvHjEPvf#SL VFF8K3Ykld9!?7:eE.ۑ3׊$_#5Yk-̂wA"0X7n+@3FN{zՉo,LH*W~{CIU$cWMkB20}t5IlO;÷yỞ?iL±^6H8]녵 Lyot1grqyނ_\Hk8rvozyUuN<7_?€q[>zo<ˠI$>i9~6 wүh4r @d׭r'a;M)%`$ec^../uh\ =ھqo\ ( h"%\D \+t?j›=Z_x}}ΑI/<H=Ǻ| N!ӡ : ^,-xKm,o =޾~( r+-NTv#<8AaF5/xB4[aI8q  W__ U|Ys6*blSL-}QgB|8ᶅ_M<] oO,> \O{Ɩ25hb+Qr|6H<שArcɫRľ"Y#tU m 9/"?|`7z4 {*c-bW#R\u$rcM NѤҘ𪄕}땼h]/<]bK˫voǚBQX=HRq5';cYs)wF{>-(mF!6GNx<⭳e8f.4w*| +Eyƙ:H 8n⻍PMFvdS,GQ]4-]MnM6,2䤨HV\wLyρ |>vZ\C#Kc#eterkKxG^:-ٟ'Lg|e+/9qkW`asN5qC58>D|޴wANÜoʜh⺎18b+' ~|>x]65p0|t8mT@o ao9:>mFk&bRzxjܪh:9͠ksw(sڕ?V#& ӟ!;ǀgKeBi|D}iaJHeܐ;n床M 1ZDkL]H}N鶛n|yZܓK6!'ˎO0-~T HF#Z>T|ܚo)q [%cB*<$. /A|wƟ |iqox/C},UTIᕏ\zď xޟ7X[5X,&8T̯ԅ>:l/nїHuOZ*.nXAr P?'/KP~!V.l51@bM|}|]|LQ-̗%?薩,zI?m!xWv&]wN&i |mm4Xri*/8um%u=;ើֲ v|OpJ<#ߍEfD%\"]W6LdFv1Ҽs?"f|w}W=OU9V\rZY=''b⦣C]6[Ś:#s$k=x$'ȍ J8P@W?oZ"u4۪xr{]hAK,*~#PXIOi!hsW(1Et>*\P\Sk [_A4u.FŸiTcF_l |3 o|8ѠӠTKpI4vc$תk;IfNxCMٍ]Svi b#h<_}x5O xI"0Xit[-m|s/1+ h*l>WsVVcq޿'nޣ+t59O2CGrNS84)2J,J]4j:Tun vm,z}{87~k+ǚ-։XlilSl 0`@a_*íl>%Mg:sԤK7RfPj.V0_>'j$^ًvg W$F,G'|Cm>?Wj'{ki$e㸴rW/u 1{&u]v(ocYCH yG}J VOqm}GVUD|,'lM|ǁ<5Nds|ԕE{oƪ4~uxb_~0|6?֩-Dp`vVHW+_AJYxQE#ZIq^sW_-ccţz"YA$ZU+;0|< ߃⏌|dĜ*n4'K◎|O3]yZ^X67,D8c@=9'?E3h_OO[w`3$]Fc$rl|ڟ֬Q3DWzqQ ּ2MWzJgD+#rɆnqq[I1V<77jq47($Dn=([gJڇ;O0ѭGm.ds E&ŹA 1;I^OR x*[đǶ]1fPm?G[_ㆯ wm #%H7|FǓNX_n[Pg +gBc۹Z2.XqUzF 0~;y4qzotxL t>ԀMv;1Rԛq)r=zc?JnirTeOqS0)0:z Nqޥ+zPRܮ{ҙ['4@!=EDdқ?CI\o@w]px<Ajd'}`=??JŴn9SzB%]k4ѓҤOԭ5X|sCSJ<Wu]ѹ_5~m[>S 1S?|--^[Ya͖={滫2#lf~5tRC^9-3Gل2TV0[bx7[MקQ=Ϧ|`2bɃЏDZ2O]Fmi >z(rl6WXFH 9-KաC%H8=r*K-H8l15Xݞ> .σ#7I$2dRP2pO}(V{Un #ڰ|7]EO Ccg^uW +dj= 4tsABOJRt]YvO>wj[bƿ30־?N]bFaX37Ǣz{QM#cѯ|cxOOiǰk&xov9rxy|ͩZxh2LGjman%A 1oa]+̙TdKכYϺ8-(n}OJ_VwMd#C;'f:O~=FËl"hbCo?n- Z+xfw;hGd*Uqv9]Nx{q^Nlߊ"->=J[ǎbŚF }ܱ^aOe>"{6 %asʡD |W[,ICo E!yIowVVż 1N7:}⟆u]z/ [d \B.$" >u%cd䠖B寉gwk ^!vFF+?xĚ$Vmy!R~mqƛ=k\C^w?6bNs߭}5hrx+OּAM1 k?ynH8'?uV B4$oĄA^#-kzk!p c8=kǴψh;k%\ZY z\5r몑N;K NQ FFGhݱz,n"xܩzSn-7#>+hnyk2b&#ڪ_joL#G#} W5.|$+∣ȭpW8n՝9^I;O98W[ z"+"GAYV3 q[AXͯ\}N6'AՈeK#k VOZGΣLg}F^2n$3 J,sczmWPös=(rʼ\&hr˧Se$2a@{I0!s_xrnLE*R޺Svlԧ\vPH=?ȫZ曪nقYQԓ?;" ơd^#n[b9bAǸa>Ľ9ey|-oZ7p p}OuGhcGlH uG#ڽ:KGEܮK30٘#-氞"'LhC'텬&| tmJCm=s>ֽ8xeV`~r}yψFo.\ORDZ׾/kzmSXڍs?WV"=חqly'#)Lcc[fY%F$eDKӎlm@Ht\HT\Ƥ9=OLG6.O]m3~\WQs{k fqӜj'ޤ-o8l2F6ztzsc3x uŒ t5[ MnHH?Ƈz&ywWq=\K3܈Fv%9=j yk ]A[9Tk. 5kO/íV;l2%PH2XwxGZ.vgqe:q9w" |XE/+PG(:t_Gƺÿ!Ui S)9#͌2pXؿXx+4X#wXƦyjIctoAR>Sh pOdwj 2vês_1/٣^#wLaMæTJH2H ?IE~H?l?ɢ .+N-#4y~!go7xq"<~5/xx.}~k`<"5" 3k _h#Ej%f>;}v? cO`WLHw41Mՙ $C#'  N_N7==+%2q ZA}a ?Yd<)2|MG/UOjX?lT7?[+nESǯ%^?X7l:?90-"~$L!g.ϛqW"Gw|?VMۏZ QeW|=-+{23~aд~"~м_W9y{YkA.WwCDŽWH{6㷓89[`Prm.GCjG?Gߠ`rqQҿ?Oÿ gi6Y?kѵ=7 r~An$i6wcXϐmQ- g_eX!:f=9a}$BK\}-vn+)|+ e :}!ݘWI#?IS:5M~ET2c21&}>pԇ?n3?oD#v};SWù1rce)jT2V~g73ڹ |Dg.={ž-KHw#/ux_?>_Akb66Vsw3p0#rw5. +VWk" M7+?Rƴ3ĸ#Ioƿ4>2|ZOƟKVD lZkxOQ''s36@?IFF} O֕-D9j~99#qTl>ޕ&qi98 ~TxqȠfysM#=:i`{bHI1Pqv-Ndu144c򧑚iqR +n)qOn$G45#sNzzP i99ң8Iy4Fc֘It<*N51I=Tr(Ji3HڠsP7lֹXJeF*H޹CO$1)4;.ktF˒#hRa*\VV ,cRQpe0oOz4#MePxes`@k\\+&2 q܎zנObUEg~oNRC&_\@+h zγ@<95Y8: βht(cZnMP?!pdvrڡcTPkzZ>b#9=EbzGkVouKO"@81V乙/.~QX\ԊVr8xvʑ|+K؜70;Ok:n'F'N@o\fDX!muI 3gC,Q\?v sV.q_kl'>kwf" $1KsPO70g闖Ko=KTy}[w*Ƴ ^CeY΢UXX4ʈOq]-D 2Xک>2;e|LMiLrNq߁\]内i"˩LoT ''564[ZG&, P9${@x<-'o +2מmsS7]Nfdx7$7|\XW*`#ǭ]tU#% qsS9gAXnuz t@ǛҮW׀ξP*h.wZg}P:W ׷}Vq>O1w?VM ;' +sT_W 78c8c'<%[]+⍵ն4iw%2ym!ۑ׹HX|Rī>!V dL4r#m~ַ@cZif-ҿg u)W El8bk/oL O^Bj*~~MF◈ʿ_1`~.~,SBfKk h1byn%V**_d~߱1-Ӝc'k +jPO / \1,72Z)S,hŕ_$N ?i''t>Ib{#chKqkhYScr ~}SW4}D̻Nm]kYJ:W ~+YCZg B;ܧo{ˡHl"=!ckSk2 񘔑?>6i٫^,=۸6lv@$gci5M9'E&bO Gßi:7ZXjROAOi>4yet0q/Q$1$0Hˍbgba6ˎR1Cc&)J?OcHA/ZwM:v)k[E>\S`^Wpk.wV uxĐLr w+7UM[O|Edtm^ԌyWq$L85)[aU/Ǐ6S_E%VLtYˮ{|ڽo> XO%_k%e{.G0$YHoMԴZ Iǧ'V Ⲃ;[c.8Q(^jgG᷀,M_Gl[\^c~/`p=[?u?xSy|Ku.ˈd^(ʝ*61ݫiZF䪓|Cv3Pc? ͠$'{_ :xf-mdAcpaG`73d_ 6O~՚&hn=Յմ["ڥ'iC pȪ s({b= #9G㹎OMT_&]GSғD/5bH< #W]MBx!ȯc3 ,o trdS{f&Kupݒ4݀dvU_=~˿Q |]f[x*|o$2?Y*~`>,Tӧ 6 W㘮|[ڬ7Y%md,y'澀1~IҝǙ{l#8",O#bA7%&UU\~iڦsY"(@to_߄~fYR]H\3@|zW|X/ͻ@~1?oSD0'n|%k.erJ,SF2Q>l1)R~R|9ӴO|XQk}ɱlFM= c~ACEՉ ,OcQ8N.49{S2OҀPy)z~t1Aӏ#^ƒ'FgڟԟCȠd@n9+j}ޜGs3Ji4Ga:ɑ8TiO419q<<NR?ʓ$84$4>:u=hz#asߥ4NhcP09|xϧR4srfQ{V'??wG Ooʕɸvu>ll.QzR"Xq[VڀkM,˜qt|4G=e.t@6O첟0sf~ a/:w ~_=Jk9Trf>>4z.&uʣ'C+c'Lt,0<('\ˢCsI?j_|Is%$/\Tc163/񹽳f]ě۟p}05h2ܫ]͌W#;#}RE6oDgs70^4;I0ɀc8.ENA0]qvjOqk Ãe1{"}dm,dw84-Ą< wkz_1 8A!p7ܟl0v6mF3 2퐾"(x%{TFL@=]oʡc^:":tOlCr>;[vT㿱[EuylYe\<>wRmEN21dY]un 1wZd' a}b馏qx]4w9V<fp|2=ȦsQɗW@O_z3+#[~I5;1=AL&l9(.sPArm2I]W!a@~Csc@g#^[4Vx}.9:FwN溸x*qu'5M4@|xzcSM&A%8aAVG MO}˸>Sl43 ## TqprBºo ֮m#QDw9z(Ȝ6ONɜ!r NJtK5X1F3?5py>*a_#Bnq XJ1{c[7c+𯎼 Cmg.)J H8=5IEG|!P|IP cnz.~8R)=1Xg?4? 8cc4ri;:N88H:<*zNA'5x7.![Go(} 4)^$w`4zSr)֙ۯOΟ(I~͞ ֤_4$FfqI o.<єUah>=J_2j΀zJc'%r1MZKUv1k},ů&?ZhCLchڳ80=3>!O+a~-iJ[b*8yɈ~?[ ug|]{(I';jޏq;;Met!5JM&l>-ZլixKIAy<8e]7ҽB? O<'xk4+)*ϩ=Mt/%P׵ a9 $Q\{ 1BDl皗n =AtMycM9HG^((&HS 9Gn˓<4''H$9qU}iʃ,z%C89ϯQ#|P3qz%?jnD=+#<(lsU\Ա[RmLJoR(}Lޝ L9Hl/`t9$(\zN#{搀>^^#R{V̚%m>ٮ[TN}#]AR\Žg\H7b^zW"GS,>>? =t }(+ ^0rSLeȬ+35/f {j¿UH\0{`Rl3R;gR61W/5xSBΗwO1O/8+30N'OҰo2cd JV<ZW u֞?.b7\[e0]y??h"Qg7qxǜ[9Icqz{SوRrA9ѫ>~2[B7(`Bs\ơj.`Y~sRYx2W1V/]ƍIњUk y<>+ҭ4QDlcW :#T~"0«DZGd h.C[v t\~0F[ y/;w{GmwCRleIla>NួRcqv#F3׸⴯.y ޣ>T5ȃ-A@(lgxz`wֹ eFF6zPt3E4kg.9qnJ\\#$nM>qڹEܬ$68d֥&UVV ;*${9~Ҋ<7*F\ǥtV3EU?.; җLPlS#VEb'%OqF3: e`[WHNA p̨beNQVc,φd^ƴ1Z/+к6< Qh MN=:4eEǮ:q\N@–(OCL<^d(a} =4&&:Ƞ{:ֵH ye!Qb[ߚ֌=0g_2 : q[<J!!NH9555OC=B'6t95?c8LXߨo9j=1*CfqU@L?Z}sFfw7-?88{q& T~5Wע[HMXV&.zs8OJCde1_gxAa.+eH庉$Seb1d;&^cOdzձ(O֋ a}?X<0{lW$Ko榸~߲ƛH/4HnoUx6`AF*"?6Rh k{exn qhFWOkki~=}X5 u. [+_;S\m`c?i(xZM[\IXXdER5;\, R+Ho%WpUh\,l$B0Uрt#֑!eDbr=׃~ʿn>>~Ͼ]l[ !_1A9<׻Z+2Ɯ1Hz p{u␣ T}}iv Rg;sڐE.2Ec0=3CsJC3IMgwzgySn84d';x;isr:cM8D8'_~ǿ4Y1_LRgYdr8m$+Y 'Cg?$uǮ3?{m $g``y$.;gutoB@x9$r uTq<Ҝ@ R[%zҳ4"e3Q2{<;y# 2\x` T'-Xҗ#+CaPIqǧSTe-PAiNo5r'~Ү'ǫRk$cOe:J~%=̌n[hFR=c柲b)^9>J$M+4RN ? ņO J0~k8Ds;xN6.6сR={zT8 HdpqS;A^QO H$8*nڤ\v4Ƕ?JE)nj|'sxK@G^oʍqZ@ӫ$mۃ9תnl>bW1X$ Gj`2yhVt榎_4:8T0G<ԎgFO\hѼ(O ge=ΝR瑻\pcV=CǑo*TppOתB{~o #:ww?yrm%bCִ6ӏr1~M<@ف0ļv>sإ'OJڢ<5 r@$pq=}0$#q\ װ!WtSںVwr9&&nݘ:/&&D"0X#qx ќb=]BV7;L=֨,P{pXwm}{O0im*$g?("p ;O3"9OS<ۚҋO*uF\H>lsJ֗MHq8?-K%y3h]r:n}YJ* ν7R3!Cv ~uPrz\Qq6*cҩmtb~^NWP-̾ZC˻Q ̻{q׷UbbEkp9U1PXbA, A8w*,<>^7p==h=ELܰ۳$(<zhṉ7=@ҽ9ll$e-q'ttf `:n28zҰf]8uhq^M ݘ`;k2~@#G҃NnWb`zV˟)N`WQQlH <hiJG?1*M]o#MKoETI8pn q\H2gd_SjmLrRONU5lx%{g;BZORy]Z@gv=oK&o,P"3|͖QUh.A5CJt*#H=+t/s ˨T8U\|!BC& _ֳ]5]ʥJp7nA =kfk;bQXGAA8n⧔$OJYz2 [>Zr͂$6>`[sF/܀F5cHf &=Ԏ ]eƁHp q\(S!\>~y'DRJxaYrLGmBw'&ۘ> e*Xg ף)Hfo qc\/ǜ1Viu;Afs~+&PHSO:WӨ:gku) Jz#OZ8RIusN1n7VJI6=N:]#5jSya3s۟oȩ2> .G 銆8$ɑIpD%70O/^= U3*6,-Zk9%y0<zchV$23Zz*$M$T`j{'0oSD%vm:WΑfQ,^rrGGI .y?,딟_]=UV6ѓ_6'a2S]n?ۿS&|;$`miC9&}+/ԣ?hAn57AFxo5 Uh};T&N{8F 9a?Kό?y[P[v2VhI+q #z"XX+Mǿl?w SGEĤ̹8QNp3+'\#ϧ5$< ~"h&ȭ=%sI'~Ts_I _Y⋥@$ǧʏz_d_|-61lfl}xI7,zRc7+a_3ÿ|Pa%o."KKv.d>_$);M.X,z^yePGMQǟeZrG|WrN1;ᯇ&Xd4Ƥ gu(Oq^GItRAN :;}9_ Fkm evZnW3osϿJ +j=j.59|?eFПq???n54+/mW[ -Xu\@zT*O> V<)C|{̮_JgSZx _VP꣒E~i:]ľVҵ8A,B*0 qXM-ҴWv4R)7H+훪ξ,O xi҆vVô]ZGcұ|W;oڴ>-#|13dW@9{{Y"Uqe# \ώ~-Q膬j;d/HvS63 y~?ioǖlwkL.C&d!9;Z{[˥F+, +>hufKmlG-v*j'mv?_i*>j_֛mڻ.|KX,v١L<9T$| j/bt:J{kcQIAIL׵|qq LmƈK3u Gxn~*xī {2ZDrd0ȨUFKmی8lm?'"5]l7KЙ\dFlWnK?|?yοeentrǑYKF%p~JV rA6PO$?$lKL06URqW1˜z֧@)98)ɪyg>lȄc[b ȲʂO~*y[+2Nڒ%Ls_f&%u{{R[kCX!ECmLheIMAx8@2[R "\y=SparIZ(2Ԋ: 7 wZi:Rͪ9p[ּ00Ƈ@TŝzK2l\TXtB읎a(Px5Ks),9#SH5^CnT=GB9&aԄPS4 2?JN3}(Bf\^r[4&ԃoe`;Ѹ9M$&/R 񻊋pǾ)L)$qހP qPQN Ҁ'ݜP T?1 O\v bO”w杼qj?M0R"F,rR5;Ax1k3+3eWcjEjUT7OqC=띚NivZpRc9\NƐJpI{B9'Fp:5xrxQҐn}] ֓kzԦ08==לw898?.#'qN۳o_ƾ,l=T~;G\ =8Nkt=|tbU(1z괹 %pv 4u Twu'mzmɾ5P9.Jœ$15:Cxo{9.{zV3;zY43żrO{KLs۞j<>VrcRe,+I U#Xb !xm)TUtOz뤎XW(d/ǵTrnBs8?h_e""v7GOD`~l^an6d v=?!!cAy鸞jEs ^ !v]k:y퍪9ҵMi*T =յf );X7n5h|ʠ8zf}C\Fx5=Nc<#yAX:~-ʍ ГIjL~+H`Q qrJ'XLv+땒d |t~+3gl =?m, Q.9?Cn_Dw,mc,6Uhwy \".6zmdM F0=?wQ–p[Ű<*dw,F(e8@Qj {% !69#P&%Nk*̬$Ӿ*N=4{m >OkYO#ҽV@,$M.Y ta89m-62䓎qփ3udV vz5d;ۂEtw6 PXzouu:g4UK14=o]oiO.r sh\H~_#9"<' C4-m#GP>Q'\_e$f瞧S^ǰZSFZay8? gpHr x c*q+gsrj;"q =t-Ne@%׎ZoV8=dR[>Kq1eV*[ KGs ?/I<VFgw*c2CNJ۳EI"%sА=*"2G1 Z\I:[Ol!Jڝ1W[Øqt ? d\wˆ~c0B+]#AU}>>>Gu?:R^3$feLk qÚ8K^vḳ=:T[j8 FA\M-ψ<i4𞥪%eiw3 Q^@;7UkJ{"4|#E׵(3 1Ӷ6Dui '~?N5^/6-F2MdӢ~M` '̔_P'?~h_^X|?eJ@4fi[BXzx&Dj;DF놾c퇮FjɥiZ!#6G_}s[ >׫3c-y3F|ԦZ+a|cv  |L~X'ja_G<i?Bcn_|NX:?&vV_5\\iV;@ʲI* # ef:Hp'O"=Z(pQ}C`Eā$qOP %Ov:WԼE l>)z>sCf!/.} yB5>:/_ǟm/ AD@OM~z< _ݴ*R$E!B~_֯m O ,w$Uކ_>e*(UHRc8Avg3~/4&2?FtKg`rk[CFd\~1jj? +%$W/ H(%%mgM{ѠB#E|٫;z v jo /t۹.) PA#ҾiMᾳe մpǴO2evE,G^+SQ-!P0hi>yYJ7Q'~GD]@5vv!aD1QOBĬaGk>8*R$Mݻ9is}_|[koZn{),e$d0[Ivrp DH9qڪpy5x;Q[_XZ5ן{-K,k92*vi䉝v?֥殮9&-, ]ƿzU9ژP;U ӷ nMiZ6R#j\t8(ƒ%89c>[J9@jzHI3[CK Ik$fYYYH=k'֥V~~oS6}2`.n ~Wdc.7#~(|9]`'cyD)(%py+H2ERLn,ݛ$ǥ!כ?4]7vW<:~i젎r'm9=+Le=Er}9 IMDm  g9 G'xGߌ^;׭|7>.֬kgBtp#\0Czt#1IRZ94d֓q9K6OaSj#(19qY>mF0͙2ܞc8]kI3I/xb9o{cNa? M?'׵ztAx8JzkN%篧ֺ-ݎW ?aǶ9p}ѭԑưC )O #Yٽ )9?\R…uLvNE-yTvcInK-[ sn$T-~vxG|VF<~5~)מEox69>t+W#zNYZc=3Z毵[ʐ99?w=MEf,2 sY #=52ITn{b3M5W<`+ U7Fqs\OO6`G\m»iRksUK>!^Ou}#\Dp,:c>e~=U.~Hc>Ht%;qh +[3ͫ߂Cw~͋9pq'rkS,nM.DgT`DG.fHv>ǒGQ&utɦM&3cIk<9^{F ~WwEu=L.F]n?f]A$\SmPbbÝZsk9F  M [đbW~*m?#t8*yWu y@=|Wp~`޼޺b6S4|g߂{⹻I ^AO|<Κ酫Ĭ%Lyz" {[嫫`r:g'ש^J:=H _5xr0T?;Ur"Lq =VZ}~Qwh<"?(WFk-j" >~[FxR&sHs-׏' | {y٤訹a mN:s?,bx.>]/FjL~>>𯃮. {Wt5V1p3`AeA d_#~HbW=Gbců_\c:{Vvkd^hB?1N0W ndI$j?J&읡!ʿ&h\ SLyO~EYRqU>Rjt3k4sL.\n*ʂy*`=+C BpP?+?RZdf (BO ~Zq k>fDR(_Hc F1d3nc xwIޝ.B K4p,8$tֱ֖i-1G@p4O:_ekzLJԼ9xa<6D*AI>/ǞhZ$vѳI;]NyȯC~ `PAE;'x+E|7U#ΥqqnGDl2a`!Y/itV|a$z Z܄\r-FY<@ .bGnMdH_VT#tz 9R.mFr9"'߁I˨9x΋gNxU^N.o'6c^o|oo~ "-inѧIQSgjmRK6=\q&{~ҚIJ_hCi8=xNc4ysO@қң s4;~̓)7sJ\2ƑsL,;z (WڔqcU$i|pG+3JO|c/b읧r,<?.EuyGX&hm'!uLvs 3 i#I938'FGYa,z1œ,A`V O:N y u@ҥLltF/oƦqْ=* 6zLߩ~T֠N= ;g$gۊ21?¾,hc/8\}Z7`R[' )*&=((Il u -&MJiyl|&W?c]n.U[\tJ7ג‘Xz8Ok&3Xi!%\OZdkU;g# x9$$yִR/Bܦ2"o3as,x2@n~j􅝙c<\zE=OtUƴ9{뙤rIWP`M8=Ol{C-j,,I힞J|3k6$㝀 gWG>Ư%keqDO_-W]I mzSrfIm htqJjMI (V;v'͵}jyn(]k%؊P. [Dh qn+Q{&qr ֳ/^hVzr䷍fe 7O%.Ku^2`Ӥ˲ga܅=2z{PlsNg0@>W ]<;b9G;dkY$Hv21U*q#c3FYN1qԚi)yj|$:c\[!$r+ߋz2oY=BJ >/E_L%M*dp<ԏoz%MH!lvzmw$o{cu7kqi [w q<g<`Sms7b-ҔY}Km (Hc^O64C(<~"wUb7f6]FrJ /9+UR$Hmf8!np&XPOG|ku-d<}JuM@1!f|<@" # z)ϰ+nn#`0zlCL >&G]ع(*˨aoE&NK '=ׇ\o,Y|@8ی:WI}m}q![I"8ٶuH(`iiwa \J XPϧ[z{khvDrbn?NW󭋿E-2'a7 4ʪf䰛G0 0 opYJ WG/7<#1LMc$o C{go]㼾{ &kƛR%,QN߻(O5<ʵ?¿Vr,9+5,oqZ.HRFyAA7.x\$Vz-jQӇt=RB9S9 eW1BE}fݡF9hܪOsT`IB$^&jI y\nJzT3kJ]ѣ}1Յ0:Z&HLt iS zWdyOQڎ:S9n搌{[N| q7%lt!ǵGg?g_پ?i-K)CmQDzt~PB~oHϕyeeR8(?Ew#g xωdwc^;By?:IB 4qxNN))ϿǮh¶ֿ8?6O_>i_V FAJ i쁤Y&M+X֭)1%θ>ZiWq3x[W' bX~2,sI}6pG@;Krtz}yt5''1 ݞ{Q ޣÓ{(!B,<Q{ g pq֚NO}EOPPZEiT}*3"2E@c= 2"B@W3}jޤvϯ9@dqqnl TDs|T  [ᦵ?m<[u%fڗpF.%Xe?:y+M-y.#vBod?2'#ֿ?l'g@Y~Кu{m:mЅmJez8 8죭k{S5XʨPˏ!6d)[l1W'$5.SW?4 \7hDS o4/V(* ̡-9Qߊ~tRiZckCmg% 9eqs+}/Ot(",KZi%v`OZm$vJV4X@>@OME|1??j WS񧇧3%B͜ XddEWڿM;םxgO#_|DӒ^{. Q B|p$$~XPt+Ҏ:w2:sSbn)t̂0z~Te9=:RHBNCC~Tʭ;#3׮*lq~t֓@9N-i&gv{S_49 hր;ӰCIIM8#4{{62PO=},2j4uUQQdA(B8cvH8:VG<6(8u:g1?ZiEim[^,ӆ^[_[[P\#vp[_:.YhEu-6U%c$_qPA*@q劝cx5%kτXI#M /=)/-- eɟ+TmGM't~iקPH]?w>@NiT \2*;Txs:V帥G_H~\T{qHcA9@gӂ* 0R2s_zn50~^ϩ11OQNFGc_ʾ,@1=ǥBsێ})$:olTÐ=54-z1GubW ٖ~09+GCɻ+rxMiƶo>@}<i5s%KX~p\t\kV兤 997WS*sݯӰwQ^na^mh}vz#$7(f1vrv)y.S zWF\88GOζw aaGq\osݣ5c\pzJA)ճ+.|s֑n ;J.tsXRP?15Q¨ps8i\G N{׏S ;E, ZҞJJMKk`B_*b3>9KF= 5#$$w;)ϩ'UZ6jY'gbz;}vBfK/ɑK3 F7*}?Z O_ eCi,+K'U#[UP|J[c;?Lא&mj{'4nm€L~@GgWoiK-WRRH$!#߂k:`>oɏSMZק.ʱ4ڒyBGR;*^\x^Ԥ6nX<-$zV_aDM:EkTwޚ?U:q;׌xcV: ;-)vg̚S9p]vKxXං%3Iʠb޼>[F—vyW)΍gL#9!{iҥfeWއYmA j13|''W}d:ߕ j33\*?ڮ1mC0r@Oq֩kg/D[4ňrzcڶvV̸#`>lZQRL pzPJK+U_(9Q"nn¾i6Ի-Z5TeWϯsΒwgM t}\it\8۽j@vd`,i:]ZwF IW <:X :sZ1fuaiII'3Y96=SuHs^gjMK6O,q5nfKp}=i\I,rګAҝs6RG+/?Guʬ'z+5'.g䍭ee2;A*૩O%ܟ'KAr܂ djo4OTWGsxnVE8pI+ǕRZeymjot`sm>D{hMs^8W9?$PϨ[sm%L*V CxgZ-hpY,S34yG'׍ i2dmGaS2FH=MF7IQC^m~ xuYŽͼ"cEPiX|S _O[H׭p$dr?H5:StmZ% $'X i {/玵7ئ8_5Vcչ+acc\1xM7kt;7_iTZu~DHiXI!s /4xu߉_syqi,ٰ}` #ڦmzpjok|%2!XG ta'*7fAQ3u{\)Ev[#kn>dɪ߈< T; \JbOGvڥzKᦿY?xBŤq*(k/eLv0 J޽;1|-zwWy2`+k可aԤ2Foj7CK忺jb 9Ҡ#Sz=F60c>S qA='p9ˊNT 89D͝]pX:дxb*H1D]OsEKgª9Zf?=Ah#a##Q}M1ܜ/-V'|@u+1 Vٌ0#^mc7'"Gei 1 3cffc5; O#:umcf@bV Bַ#m? o}$qkKź[zNcn- 6VA~$'+;A HCZj9WiFT^8Z$ŷ)j6ih>f:wͦI=z(=v+N=-Jê9"7%ӧvYrY"zӵ.?d2~` z8*I-,KheuFf,Rt{c uPA׾# @% лsy\jSFڝNd5MI j/ gg2FzS𝥀: *9XMlRwHG;@[Hgi^ɬhvyg=䐞b[`;vCȃ;ZlF>\u3E,m$hhN 2W=xz=?TAc%l@"IfܢC8R'n5j/<ګ#.OO0ƴ|EVmF4vdjyy1}8tt^ח>` BLׯ{kLfk{t{xDw@mbl$ju>zƳYYPO' ^+ j[i]/g# lE-[׈t6A7fLxJ#m*;9>M$5̚K $xx\P 0Ӈ*#8h7BYRٳF{[wl0 swkq6=Jx&RH Y]W. \i:Lm!`̤2YU-5x"6ua@۰hRFht"p8Gc5=°HMk ,RmH13Wx+O=V-SRؑIf)*WX|FQ2E1ctSC?Fsqvy/ռϥˍ")#Kx7Rw*!9\[FPc[IנK0][ǜy"θzV%1f%`k4|%2abehcO^wy Ū}VXMshG`3qkxeč#*A ѓಂJ 0WZ%fڮQ;i%-0Ǫ-m;ʒF WtMþ=W6p y$.DC.wu-T)'^%c)ik=~p;eB$zl*Ӟ[}?R0YI+lI$${zY~%դ5kx /rrGFJ)}:cj9 E'H:a<0lȧUHnJ"Vb5qAa!n\BO($ x+!v2~v#'JQKeWSR|?h_kS&?,_VeaGt,Ÿt`STTLR4ϲݖjXC&lP{<0܂=#o^Ӽk᜵><ȤRVH ̲j[:Feӭw/Ii0r3Jg_UBwUM_R ]i?>-}n11+Ih|T͕ AbO7 ' KVΩYܽĒ)f<^l`ں;edv9T9=־/|#ivzr@nMU{*`'Z+v{h̗ڍtdx$VERJb+LXnk_|1[OY>!5gth CHR&UȏσY'a1BF:gfj6THkIz]R\ǙʲI ##v"8p͜t:Hth>^ɦ^K[hG,7ƿ ~6jO֮n[/4~myH9m/++=OB7t9Imc lyrr{UС& eʕϸ<#kL%N1 pL:QsuneԼȯ<' ;HГO"ժIe#Ks=p"QfE@|c ᆅ&R7Wԭ4 -fBVH3#95?lFm]$GE.+Ԏ0Q]ݯddOY&v.[iM kÿj| &ޥO²V«na` /ŗ_m)Ԍ{r V.spgㅇwҬ ."*ka+cSJII]_O_YGlguyp҉xpF  9^OM<{kZ}DVhW p9_Mgğ Aqՠsbk%Yw|8>$n,`Q.tM_Gm="=چdV $/)ao؛?>,X'~$hGشѴ,wRA3` ^xSM_-ckh czƿ;)?iFmKEu Ԯ<[El 2:+ZT7\)FGxK^ҡ6{uܼ1*봐>(xŋ9mc-4E[)p+#˓aj2߃o%Ӭm-ݻf g}7 b Y}?R?gY-vF?P1qDQQͨ| <nnVX8SʁGN`y5~7_/OM{x'YR*۴^g%W#r1W? b]kRVmC=3| ? / iZhiҥ;YtzBKla .yJW}?ςgÝ,is >vaFXGt߼S_ǩo@ 3 2"62ijJ>q?j3z׆4/^B |IdEWMAvDc+(;+ECҵiI+'x_ 0J/=1KխA*sʫ"e{@DqUUQubFf|^.Oj.d6km{`r.2wg?Y>~$ri:ޗ{g[Ko+wY"O&7Am i#ʓ_•vPǵ51s 7?9olc 9”@⸏uVֿG"--64-Aeϱ|L>xĿٛŝiIX gm e@r<vg f~jvY dÃ_QC#?n^lV]'h#l{x\ILtTZsn_:{SV}`U/[=??+#ךuJw<\A%eU`? UpJjo#MGLu +b|cZg_jx$a:ю=jB=N 4q?Hrx2F*fM#<M) M'w*c|?7ٲq?ץH֢' Fсx_cxr+2v1ާ$)[<ӱ9R6̀cgՠ&LplBUZAm'iHxa2`'?NAreFXX`x*M~CY[ # w3ߚL["8Vw=I,txѴgĒ8?6&"}+*5N|Mmis,ή1Q޼݄8^$[fA]ö;v-l/w,$zw:2v݉Q^Os$:e6Rnq)qjIXL~_'[B `='ҽ}ŵ=l՝"۴r9w53P=XJg)-p'i 9-] ퟒb9b\M3_^$>'/.QN,2\LRl~םxǟdTx+<9qᯇ!Gr%hYIaR2Փu,X}l<yϪDѐZ9έǾk<%ցmI>ף܈VA|p@^[j֎e/gj3^im@ȯ6ֽeWN4ȯgI,gMB'җ F9Ěҽ|*Ьd|Mp~q )8W|9K{t{ wE}Fscou\rHwy/ LdO]yO6mFӯńȇZƛ>xzoD8=_uM?KRmc,K^$sϖP>K{'?yRDۙeI/ORqP^X]߈u%9TUYᡍ3Z ̥GAZű ^ׅ'. xN@zF~Nw8 _Vwqs$dcdhErN:0CӮbo/.Einr#/}k׾)jw?t} Z;H5%x4BTK9Px:."kmȷ3Dy{aexcR8dִmŦp֯q ArA[&1s׌xcăGKNDVZxK73eVuw(c`9o*+ew}cr%`MqiL;fCV ](m~hZOt-C]J?1eB褱]Skg4Mj_ǥ[钴 "b"RHAbUN>\QͽNA<%Bԭc(b.%F *`(e p@ 04'i{&X.Cs^4%ՄBSaamjm+%ղvJɯ]X&{, ' 7t&vs^N6zG>t,k )Hztz [nE}Jvkq$otɣ}^0v+I<0qkҴ$SM!!M홖§O噝†=Bk/>ɨZ|}yR՟>A=qtVy<` Wܣ[luRN ud+$|>[wk{}:d̃c]ǭ/H}u+}V9yߏ,'nIbuRUL tku9G^#bI8abT@ % T#}2 gxnr?!ڼC| +ڭ]\,w'>3\iF}-фŭ.uc&uu *d%Y|eerK:$8τo4WT>}_Sc<ǹ漳_{Vէ|Ai!sid"ʠ6=As+U9mv#NX_q|F3kɼ?'4ͳ\uAI5R5DhB@3_.A})˘4v$#$dwaG? T5o~-|*'NrHe<{(5ӟ 4-XYUq ㉚0B$A\؎#ji:"`vRk I_QeXz\+.REJzŸjCi O`JS_1Ş%A}}mov^@]e *1[ )ש'yI@Ιa32\ƲZ~Jxŗ^/㨭Ko%{k)\G(WD`U%W?/Oxvmq;yp2q,$~]/CмD`}yl LsJ|!H ^YV?ew~>" ?RNo&\o5Y _iǂpF_pq 3=z񗈼!ͭxOpI"JQ7o BR||~խB[[ BE8RIg`q`g?ovc٭OICʠ8q`q#/?ž{k[ Fak B7;@s2V",99I<_詿4LQ sUG6k?`_7ަiWN[G. 4Y3`돪g?ISOYs1ɯ9ysm:OF|Kq(Ėr(Z* uAt|SOٯZKB[ɵ/PfL!m;XX۷d{UUKu0x\CiduX,($v W'-_|IF_h5$F_CSѿdH>?[H+$Jf9fv,85mBWZ_YAIB2C4LT*BHqj/oEֵ&HPUo:u * ?2Bei砬\w+WOߍl~>[SبRkľ9|컫xCz'}Eg,M}d+ZJ $,~l _-r{'߅.&^5$[Μ<,sD<ǡ4{I4x>8d1k6pĂ1Vdt;Fr{; 6 dDo8Da5bQEVqx5ytUǜ9R0zdԃ9ϧ)fQq=(sQO=Osw2[w*K`8Rnֹ3FxNlbg?E U<3k^;fQOI!QFIf$; GhAw,&fRsu6CI.|GiO\+/>8⑓yۼIJ03۟jQob.5_ ^Df'B 죭x#ⷌu5'\ylaI䁌qھj_S>DkH[{$ߐBX~Pp؃II_|?,57Rʿ06y>f\l GnXS6McE`繫[ =+ wO(n}WR_u.K, f8L˹lg⼿gAu~&u8㱼m>tmHنVM7?X]m&?!R~W%?Є9${W89nsG9os_]YU.jKBL%,;A;@xNxΟ?HeKyT;ѻ3hZZ5ŕĒeh * Ur6GrjYQ"V>.K2FFybO_ʮ[VGC#:^ "+xُO|+HD.@b1z<=\Y7/C`.=: B}:t)ciTfn>AyiϠ&f+[WaxB|'"2: חae{}#`^}|eby!peYdʲ@ ݏJ|KoewɫVVE@qu7-V91[!8 Կŭ[<;8%q&T.Y˓ϟԜִ`&Fkq.Lom&$+ oC9V=:WSOjandlҺu{w7PTS_(| ]\uB˟$C_ [յK8,<ӊKhgEQ7Sꌐ~(5 _?y ɕoڡ&Y.--Ť3“UM˩w3,Nk}a}=|U+'ԐGYܰ<2FBF<F8fG!cʐ ĒzWxk—W>0#K"X*Aå}Uῇv+Xz[_K<(sGrkg_]>5¤$1(lH`a[I&\>cD'n[!R~V(g3kVF{MR?#\1ҽ}:ӧT@ޘ?)GNr+OGGXňY H.@f#۟'j =]aw/"3*3NϨt_ʞ"r0*|7Qys:6Н'ඔbX1`WcJO)~xRyݰ˃-dc8LއU6/N=9&h̆bf ySU#­ Gdx }S?mB*&A@ C-1'b`5嗁uUk?\ICk),d:\Ҿ[º5ةI3,ϐ`Hg3HĽryz|UamBz+A ʹ FW6&+Z⍵ķ_&G '%Uz*خKǗW:=Οg$B$QAe#%[}^'!) ˶ܜrkOtVPDI?h+ VMG̹QGڟD5(WwWO ]%e~9 ?Ƥ"Qxڊ gv^&D@H_R{V$*%]sdt0NҦoa&4 2ģMf[52ؼ{սs5)7;e$Jtk׭g TF'J$#78t/ۼSOQ)um2,d [IoH!6WKRH k˧M@Hd턈h+ Օ%i 1ah=xX]Džm>Nַ1b7ZoY%\*fT3:ߎk-e`k[9' &8'Qֻv]3PWiZˉb.DwGz2)wB Z_YAHcdt\sKDX۶[05(AIzkpBvAF 烑ڹԭu2"ʎۧj$kP ǫd'd 1xwPQd ޣG4N2HAk#SykKs̹/O qڙXi7F͑PGm-o%eo;;$CW=y ۛ"2i顺$Ecg;}<Lg/d9c@=?*T+;-Z`Dh rT]_]i[(=r0{Ocvq50cv^o/`ol"t .3m[{$?y)k$ygI5,^uK;g\󆯸<ɦcqQg9㚱tYLcUw)44MJʪB;*r)"9 [|$~˫\+>rj9)T 8(~jJY0 Gu)޶~6A7_m|!ŠWv>Q1 ry>Vhʖk-' \.c6 -c^[$*@+ȼ.?IGmӗtpsꏎt_6SX),iwg8R.JIu{o<$\<ڞ1[۞ָ<Љ#G?# Z-v^o./.Y%V+'*A;|wBDߛi. dbdY<^&8uv&{w'iDN)FC{~s 3\J-ݹ _j;əfԮB =s]Nqi01]+5T̽o{ *2ޫ#)S=)xkﯛ%$z 5Db$a!DPtUr1S(GҮu%i;ij00/C7Ve-]<N{ӳj ڼ3m o!- {5k50U#H 's!]ϯZ ?ǿ.xG[\KQG FOOx t =wMbY-B8CԔ"b`"8D<ixcৃǂ'=ŗ%k<%qߚDJz`MNƻWM+fk^ @ltB6DKpUѲ5SBѴ i6iY k ;Vu$̌@PT[3ĖR;DH$frq~1~zBtDf!l <ڿ`|<$Z_͸O7>3_Ÿz&<,V=G9B~=F}Z˫ HD=syRxE]\-d+oF)Xrh׭|;xSokUօGfS"Aɇw*5HԆ2E/EM͆Aݔ:)f  +EipkWXI/cCݠMSP Y >I~,x?tk ?j*Wjw6exrx7wbAg cL A'!ӯIb@z1;P{[ǀ6xPx41d1]ZNz9nQ$qԂv =Zǽ.CkvpOnKcлi57KҬ[RX#N꤬a,x(&;?O6fu {X"\m+|?;d$Ey|Az{[O!P¥}A<0'SĿmi~(f7+UJqRK˯ٟtrOdIՀSFpAt6s̉&CĺOji-ߺ9ݒv_?f/SDK'o L{6!!Z7&,d߂KD6-d\@oS&ƍXگ|9W=$h T|NI7c-΋Ş8~{9J3O&Ӹt_vRcM}0gۯ֓TtRq03g&8N8NA?)'*2@_wpX_SUqG^jb@3`sMTqcVk g9ɨfl>SG=:8?HGqu g뚯?U{-=gwO"0bPz+v^k:v=ض6/ $+- $^[,i`ԝā9 砯`ZVy6nVG%ihuafz81C"&p,1.(=ڨijnr*l:cj̪eωJr_Ju+I-28ՄRF&ؐtyi(KCX.5ʨr#H>Ƀxf5%nY2~m͆c 譼bG{yN<ޞ=OAԭ-Pm נeKN\ta8|*9x#Ztb[Xi ,Mm@ zΓ|HY#  }Kw3NOَAaEeiE4yְ Σ໥m"v$YDh*4[?Y\,?İq:`PivwmQ=bv &16x"5Ne,ṉ$dv⺠ݏ:+3SR$ E9qt?2˷wnfWJ=zҼSzC6 ]TW4]L6*W:yaumߪh,OR> Ⱦaz܆=۸<{Vk$=t%%Df84kimcvqчq_<]cmWLC#-̃<Ҿ7մ{=n%ġWjkkg-]²ht^kSRZ;%= 8Px|WxU \ib[k#KN\[[\o8\=Anz&mY\үSPh0#8(?!ssڼ⧄΄fNnJAP2% 8"6lu`*G#xN{t  لW9iv^a #$k#n<z5śpy#XhfmcX,1=8\%A?prG>C&N])j2\grMCv/DE[d{tun'B9"^Enek%T1+'y}Yé $Y1^eVo4k{hg*}k-5S1%7d߽rWVM<#0**PCƧYs[Ⱦҧ̓;ZFGn 26AY?:Ʊx&&: -ަc713s;vƵd2[Nٹg?뫸"n0!l{5_Ŀ/x=;QGe_bDcW! uImG)VgU%Jr0[ܞ8ɪr9M̥mjs\N^:.f2eޛp+ۿXHt%;@>E qu<>pe,ypnǣ<Z&2l*AOGv5ͫcޣvߑӌW# ']akdZ- s%Y9W|.Vehr;ZK Uv`Fx<?|/|d`!KyԣDVB7qqW8KlsKoj72%՘xGˆ=V@ 4Яn/[M`ǡQڽ~!O:I<6#Y1A'pm6Qx;;ɡy`IysԦmAi͡ qk0džC0wFp+幆h#s({랷KYĖH煊Jޣ #{={Zlnϭ[ȋ) e?ⷃ?=2N8^3L`Y`duMl;`#ƺ=c|we#"0g3 F'opsR*&ȧy <҆+Y'rO]kcR4[~+|>Y/P#L:aN9^{/(nxMP;Ly%ydc"ȠH84\7T$-@k3y[yiZIxA2Eg }+ M]1ë^۬ vlj 3*RHum_^5|CqelCiaOy (?2Iq,kY<j^/nMwF÷s\i-aFHۭ7 Q@wlxOgA|iۭ*t=ÇyL$e\C/}9:i+cVV%J<}ܴ,x?+U:n)ǿm݀Eyh? |5WM֜DH)m7)6n=k| u?ϊ?{߱wĹ~#|@3^ i i$۾V'zne`<_sxfU^k9UD'k1pUARH#|1# w]qk*xYG$$t-)τ x6ψYO׮䵵Un+G8ʰ-c3mK?k+v.ejf; , h=|00[u8ks4)$+ 䑜H\kFO`${ @ʣ͂{ P. y^v{X3dO{ߋ? ~"xUկ7D.]Rq NW܁!A'?>~̱᷊>=%V'c  ?w3 p#0>lħHil_5]UbI5/Aڇ~pI|J|cP 3m`3`+X($į¯]YXXIeym[i{גAn#+lr%?ǎMΣ|<[\ݭh!~i#f8F(īK? eSw\tohۣyvP| ߲&7< :XGa2i[nN7pH)?ك<-jMZ[P؆јrT~+ ·5vV0}>bx\~u~+Z7<]GI${+vpxYu@0XxKfm$w4E4G]20T 8C9h?okXt:ai?cRӾxMŭK(xP%ڏGTL H(d$w}:π<-f{RQJ@@f=[CZ>7^i*u˱~)wԞ?~AI?oO=;L5vrd>]&$m(k x`u9,xfPVZMfwHMm'KNIlomo"IT# / ^xRZ,Cs4+c ;NHAOoI~W>jrMt.mtCh{]pVx[~b5{=377\ M6[h$$6vхؠgjP;kӾl@#Fr8'j~/}ĥ!z1Ep:W՟ .;iXanyr3)"n|`|L3OX_H*B9,PuB9ngFŏxDK=kq,у$I~$l~@pW ;62\>]gWhK e[*r Mïo<S6|˩OpY8 [ܦ⿲~ ieNR6䢞ʾ`ӛq=i1TJW!?RO:~oQŅΙ{N˿fX)9*@l{m/$5;J0u[`wۗF6Y}jN|T:0 ~i:]iUVvJ{Rr3W.c[DƴtxycvyՆ~SWiwPr"iR"d*r=Mk/Oğ #6\kڭzXKgrI6X,'׼Oi/⵴pH.}H;wrsֿX8P5EGV$[2Z̳`S?o|-uFiէUJdj3N{Z) GRL/^#W~x^~=L-ʩv䳹ڈ9gfUC V&՝MFw^$Ȫި@ 1vՐ8~ɝJxԥkz ~? ?6.4/˥^*@i IUIF2+еHM CÕpqh  ɸn}=Pp?#A: \dA<׊GҜzp"|v47'ҙMI>_Tb5l{ߞ)I=s@z}sPnܻHt_zUc8jt+L۩֢ `r1lѿϕ>޹溾r O@j =FpB{ :ac-Kkr)`*A 󞣵wC%f{x',}5Œ8_OһxQMF:Zd&$kNvgOjC@a@mFЄN2=+e#ke K-yMqd܌2=n~yW[%c :Exũ7o]n ֳijxI#n|nH {E˩M3-nd(';329{Ww|Aꕸo+I6D7G%2k,_CkXVeTThGf,%c+?6"5T[ ~W]^<3[$ #pXH"z:sW:GFM3""ْANi Y2NO}+kZ~ŘɎ\|n'W ]2dt?z&zh=Gz:3E<# >wS_Yi?hAw,c5hkSmo/@bI.GRg} uXͷ  _Z,:s1'X|JUۚe&H.NHOcּ?tI2nUA9w]; ~z%26 !X$^UeaG9˺.N=;ᯂ_tkS\VdcPWg;\_L9) +KgW!ҹը^XB( ==3Z=W)XRry5 \c j:˻u8Ep^1wy!o7$G9cr*Y."Zr:Xo5!Hnc5^4>RCymeБ,q_jF>2spvqxEg 51v+OKcSnE.{{- ƺ.hJ !fdWY,q '_~%duQ.̅QW04q/~;%0lEVZmIGsm11Om\vpCX/w&W tFG+)OӤ8ۼ$ H>SlU&M`^6yhw-p2 ʞ֪\j nxft\a7c:ĩY\G@4ԞXLqFYTĎz".U8b]9hشno-Uٟ4|=1<([准b .ɶO,*\n9?kEѼ9mk\NjFOLFz[{GwdC'}cФc۸ čwJ$bĆPd8ЕٱCkU}jZF=BK;q61(=bmX>`QN>.>fc+-*MpiKyĮ/ֺ)+~#CΫZmdqv*o63 øj5/[au#m"Vbxp]1ڵ5Zj]km^2 Kct+?b}A[Vm+ču; :]10*@KlV8)G~ݢV3Ke+Oj͈H|p[lI-Al,GQIŤ1R-~`H\)sSZ#jO!6aչ t;[$}@tȮnIq4PEp]z&u^B6窓Z~+5iCkVo y119Wm^^j\Z .ze 3չxeo/o,%rv>xgwsWKfP ,D:"cu 5[3YQ&6޽]o x>ָ=lyvd,. 2 ` X'# XoּkXbLW~V7|o ÿ}=ٻ߬,~GWFB)lE/LokBȊ1o7ViKm4 V(m%#8>xW|!+0g)pH+̅k_M[5e!Gqvh_Kᦣ+hnep')䫩*Hkƿ&Oce(&iq 7tLrF ~x7~mtxIAV叹 Dҵ ^Z3Z$V܂y7-ͅ;lCOBimT@/YF{ɯχ_->Nlʣ ?*kID.m<-of,tY-4E3,Y$|nvPxUTx#E; Ck_2!`"q 4 ~_~#ڭfI fg5/~//ğrx|wi4R<9Q&Tឃo-$e=sPK'z4lU`pW~|Lx+M Ob\Aw2+VE',4rCŏo컩ri +HIRU+^;[KNZ;8LJdpUCu$k~(~߳ݿï&mFK!#ڒ h݁đ`=H=w1 w=Bs` PT&l?.i׷Ql'kk+NY&36s6kPik4rCB tyj?t$:|\#rW]7-Zϋ4t[]6iʱѐ7I6USI;n}TW?Q^?-߅:oM3[Zt^}TG#{W3Y Jdmi-ψR{:Hcg71̛;?(Wskoڼ,S[RB@XaPmQKq%bZs=&}0\XLYM3s%19<<=&-t] w8sVrm7GnYaU@OR?~jֿ|Yf$=H\jAlBH #p$Wlޡ%Ғ2ď"ßcivo,vnc)-wÂUHIv[u_Z"[tvS@=9s_u'zcO>nʿb:PNUB gmz} LW|Mj6`8m=5 c h^I>ּ7?_j'F,[7fOvHBb=ǁ4 F=;NXOryxK U&d6F2 I+<ͦ=aquc} 6%_`$RL_s*I.6^I¯vuo>K 0[gHW\GşmK%tMϛ:E u#9 }QwziSOG=v:lF+nS#IѨ'`:9_At#mPDfJ×HS5g2doQT+"m,d8ydt ,Y8oƏm⏁ڷ.Β M6[[4[ "r0+Mxt~5%ԮlIŽ[U&BWy+jy?-xokR$^LZu$s#8Q@:xևxkVN5f6@VRJN ?| 5XKO-_}#%KˬC҅d>iu|.E؝]/Oˁ8W?3ᇁ]Xhvq4p(i /H].?Eм)g /89ަ,Znox'VHRzjXq?~#؟%ܛ}Fh;ڟhO~>%4˛_iVQ0\P8_Nq= V>.~7L|IM휌[J + G{?h'06|Lwk#ymYb{~_j^(XieMr$L4ď1ppUy$tԟ[<nBB^&m (v+6gJRixA>͹Ǒ_?>!~ x_Ş)Sn۳ϒ0\\F'5c wP6,1s;q\L.ў:p)sT`уҌw?F)q2Lʙw`b?_~d-9zVAdX8Qg O#+Qb}[E2 ܰ"axּq}%Vc73_Unw5>%͞\١E;{P~ >H䎸ZM\0:\XxwMyݭQ4r !c,@f9Ž95ڀқT5̲1V-;#Da{c$d梺;t^pho$ *7ɸ ~i]@'  -)P6<dcr8z>oHԧ^D,謑O\UtO. ^GC;tVn4j[e#XڱL yL{/-FdΝF0^Fu u`S>PN}k,^҉ .cgϾ rTLMt85QHWC 2$GS]Ω5V|ZSx`B:5$B_OGE:pd&r3v{CKfjVSZ#Hӵ;P&FlMnw:{G?Js3]N?JiZEFeOWt*ĻF0ֵkw$qNaU?BkJ;R.U#;<ϕY=8?ZcD< H km% >R)H;?jiU0Re1 ZcuҒN$F`Wop`Ĕ9v 1ר}Om xq^A:GUsҴ/4Ž ClZVCmfnvc<=ּQ2342{p[y$js.6جQ#F+JP6<=%iCnf6/e4tn[G.;zT"؍& V32G$xI#ka\ }G!_x=Kd]]%I;@QTZi`:\}+q(G3o#U :֥{m ggɮB+U%kK +fL],vXhF!Tjj,tۋ>2bEg=A$=Nx~C OZmw B`EzO;\E=+ FV~{k֋6 EnaBz1 #߭zo@It^g7y?180@yW]8+d_ so+ >^"WR1$Y"v:lI5v Gd==2jI y,YKh]pq[fIZ n=pi]"Lqjn `Zx@o w{Di,Y9uƲg'E;Fq?ޝ(g.x#Ӷ89?0FaU?n߂~?6Oocqin΍;,D=WEĎ |}?EimTMkA8VU8euOR49,"hʱ+r2hl?| _I`uV˛qvjoUԆFrB1ſwo Raqp(bSMd=N+k9FRE2 ES4}#MXçii{t*_ 韷p W̛N\c/ xG> խ6nZ$\uʷi0ap[v?*7vZHNVot ɵ v:1$QX_k7mkXWy}cK s>8ŸjO3ip-Ưq%R,'8٢mN~z:,_s3h}!yױ]DŽlƣmbKu$"Vgu'7| i1:ψ Gf_}a<45/ >#xo54tDloeqp^2U9Z@{y/<#; ^v#[\&{0'7VڟeK%fIY[`Q_|7Z>뚕Ο}{kإ[6R6'`IQm= W~JEDfj3kDd̫nQX? мG^7]]#A#@c `Hcn#l.YWo+0N9I/TҺ:WL|콺K![1#{:hUEGƌVFO.<3Y9$5!<,d.{5l$̊qVIT#WC6-XjB;k^~6x{rVif ˸\Y\ N2nJ~ [|=I掚ϋ!4_$Wv܍[?it8h߳;[ᾶڍ-.t;f)$tV2[h>8W^(嵭廘3ܫBHh$uG82)d`櫡inw:v)X&d`2y q⿢w -:ᥒƒkmyo$ELl iZ"?(}ㅄ.U×)"C#Ze|1?g]B=Yim`l>n˙c}:d.w. v=U>!j:'*V`CNyO5+mXWgxcoEE|<-4kgksilm/bwd88`@ 5UsZ4Rr'Y32Soᨼ} eY 0g%{rk~Ҿ+|;)4{ @E̋˳" gN2%mvlm~3{%Z;{kL'xĺx_4&?G<=kP`?i7h>1оϷ|ւD qA'(Cx:)\:ı ?&2QV>|ipx3Y]`+fYJRyq$I?7R~Zm82] @Ƕv? pzb$(Z|44Ufm8 q5j >1xkzTKqln#x7 kuJc___xwh*b1i6B2 |Q7M:orMЭ.i\窈.ppJJf.pzks+ 3pJm]Xڏᦫ>v}b'lۼ܁r~9C?tSñXM\ܭĢO1;Ghp5ԎUճy1c^hU,RෆuׂHjU$u{G/ l<0+f0|?|W7zx8׎3Oj\4Fy>`<*_3֑R[׭Gɬ }@|FO~OoʤOsU;RN9=Dz~3󦎛At.IbHq5Tϯ9 lojNB`8'8릹]SiFׂ2p0(G8YEu^r}*R{wR)܃ZbHBr\q ]֍若\^^x,^2x xCPKa_&#RaY@lwj'fzݧn-|?]c2s׸vg]/tV6(3+\OaAK:+tV}ŽKel~jq6בa3Զprdh1z OSL[PtxGl]i%ՓCD1Iu B$&p<%s[Igm ѡՙˆR0 vjCW9Ҵѝ#egP~hT(c cQXE{6<I3;@oSl<_hzwly~k--6W \v<םY7{CG9b2ڬc$Oa@kx^-[͞+yYpy< qk6MVS&2xSU,N[ZiJN?08^֞Xb&7 oi6ǡZ K'0Zܙdk ȌN;0`3F;VPXmV䨌]kqSm6$R=i)bBXNyD06~}Ȥ쥹*\.yOa⼊M,tcnū6mC1J,C&'`+[PƯ XĈLp9=k_fѼqgԖs۔}mtqtޱIᱞHb̹U^9Ϩ\O}mn۬2\JӖ*{gZj[V+{ore<1ӧ 3u]X5q=YCGń<Zi6R~XӮg{$Yb03خgP)}nB,H'v_OzۗCS7,5kM&ЮuOKd LG-٥m,!o,lg ͯ|7imӭzm4sG<[<"s9/~"x{P"#7I8nD,=}뗿J&yaa7J|ǒ9ctEb#x:kVR_jS]ElZx  g\K&YC3޴|]?Pn|)~l^ٖ4f@ŗnW\g2O|K 􉭵k;7SG{iTZNIxnC1$pkgocX,Hi˃W"v:6o>ժrC,*>ջt/UKzSpȽ*W9 W'̆];u} ( \ϊ(c_H~nm;[~Tp~ >$כ?*-.s\'s:BQuoHDz& ~<.]cLZ[jv0鍣di{*}ծ%rU8nGҐoCR 8bzOV"f>lM`m{j,&h"0$g#5cg<tex=2G<۽1&#s0yv2797׾6oLg4 wׯȶNG8T>/xKwwo!";Y?(&C'BkkGUҎ!Kw Z zX\J=<Kޙli7T\OoCP}95WTӧt5 4jXeӤ(%(20JùH_/麊}kg/ ^6|UKENNB+<3:i0^Y=#5; g«uFЫ9q_~+U߅Ded: R1d欀~uۀ<}=7x|ܠfm¹kh]lA۝U2;⾌M/ZCᯈJHTmMGA c=M| &Ӿ|5-BXd]mxYUUukٿao ]:OY׼eo$e2lНk d9n9l+i{OpៀY!Qdk}:. *;eIWxuF}I!KpNg<$gW?__)/ҩH x`M~]j\Y:ƙڋ-7kS0F&g@<栉-],uoxWdT3|eVу&Aq'J:V. |~{0}3P9K ~1,MٲIi4?#ۺ 4l6pG k;h|ՖfeF/@Ò;u&M;ZV[&mL]<+p+/ۗ?x=QƉhF5 YcOn~d~ ~-0Ӫx3vZDWw0" 3$Fv*{+/|<[g'/um3Nm6wtnZHıIbU'x)S{g4O A .S5f!/}t~qMҾ 0K}u*@D2/Τg#ҿ/eS_o$ bR?坬1=r{:g!iw_N]-Fu]2|ivW>Phg{ `45r, %Pwg '~'N ijYR ^X>x?_}_Q2w!#>w/Ip3_k[ 1F DAUN֋Wn]ůX PtV@cV2FR$_w7I/s7m}x (EW-)JI J-D=x#47$bpAJ>|\/I~%cOĺ5嵽ѷ\ؘ &(wLy^3_ާO t4*2>:jz.})5x~okŤleOOҾ~Z;;c9%{g"ܠ- erUҰ&e itDΏ[;כi^7ݏ,v hTȅ53#@t 1b-q^iᰁHɦ1?B`s֣c#hǓҚ ݂}y'pGj*iqG)HdcS1֜qא;Rm@~"rΙϦ8w(89f$81U?Ov=zT{qPz('9N0 GLұ` *2A#t V`#r 7Pp3{TGy=i=W|Xq8u1> 3T~Gqԓӎ`).9re# ^JqH]q ʓ߁zS1^=PgקSLwB,,^u'&_Dخmhb9<Ǎ5˗![Od Re"9b&#uee>`K 22^ǭxFl${ǿ~\o OY->oS1$HJPyFcJRY_u bO̦Q${_)dILH^V2m'c]xAd(ftuI#xH?+͕e۷*:"8avX\^D;\ -͗='sv51:GBi3SZM&+0춰D@C8\B +tF}vy>abaQ׎kٛJX%YM"e#p:VeQT[M>! $vY^mhj{j+?ci4W:ɋ}EoWj^g#$y[1רk5doJNz=}K[B ɑ̹X#ѾZIg{x(D$Sbsrr0jVxSNMloRTDBQ6m:zbN O-)?w1^̗zd\W&ՒJg `sx溩4yғL _fZXrYX.1<֤Z|;L`E\"`gdwm{~(-Cut. ֐+%789Zx/5gdԯ8dmFA*ѓ#"$Dܞ_)*i{ׇ,W"5 vWkTHTs#0é{~3OCFY3`svCں[-in|Efbwln$_uHQ,u;Gm,@  m'G&v#MU|m6?e$g1ē8 c'^ͩ^rpI#zbUs +_:8aDkJ2Ҭ,`mb+5hڵU̲U U|x_pbjou%r,#~eU\B)B폐>Z\ZG R /('pɭZ(ӢCwgM[_EQv咠^9~[oe,o,cxg3Ě\8t[اy?pnjudz^[@y۩T 6[z)Ҳ< N" ]hMJٲ kv;G5 Y Y//5G;.b)≤BуFVu:0maq.Wx`en^WUUFE4<^0 FvEx|̂Se:gZ֦Hf/}Otcc."G'bioĺX0F. S 8!%y-ׇgu'a牢̫iqst'xq"(%\p@a /^e4\~R xwbyx Ie哝ǐ+/B -'w獆p$2Hľ[b9n~w$lҭ$o9<82ⱨrR SËFؔo0,K#CuFk<h$Y)BQ*;rA^ \Y[2.űS2@P׶+-RژVa T6|67ACP@lqRYUY2IZk8 Ed<W_:^z{ ?좓_3܀p+_qgSӯq|cֺpK ?SFdy N)tH {Vu븜 wtu uKMmaqx#f{rG}5($-~Uw %ƙ;ߨAϵwڽ>MƠ^D<+ټ?UZ&ag#+upOq c#$PQWcu,6%ϚO _f xN|;{m>a<3D.2 \R?Acݣ=}8^}WB֚\ZI v{GG5wV{XnU쫟, #`^oq]B C۶/mo]wo]|>oX} MEnBW>ٯ= l|A]E6aW]X敪V7<+$R0ҽ81JY{|>1$Ei{{%*|'W P6X<{j0BZ;v[L1nRMx3ÿd KZ  fcc̯"7u$W_ş3/l%L^X`9a͌D$cOڟO?_v=Ow8ӵK(yZ&IeX m 8损=>=E}PIm~reWWP6m( 0mugG]M7KoRqޥ5-O~ mKZQܞ`Y+UA#Jό߱bxŷ?~|1LWs[av -qm4X RyPO;9MUy Lcq- bI皇>ZqI4i<WLdfQrq}*@lI@ #Q{oMdWLmwb瀸-5#'߄/co 0iWm-2M4HB %K(,8QCe(3зgkp/bӢ񝽴n=݁wP<׫xO߆6N 鲏vrǢB!>ߍRz\o g=ʌ_>#>"]׀o֔Mqx'\1c|7]Cgƍ-V #̣Tp9r*[3~Swwk]b 6Y we3]8+q`9^hMsJ'JH$*UXG9õ59qHv{zW|e|\*ՀCsT|{^y:LGM[Kiϔ\ˎ?#.w_|T>#Bk{DKぴ $ڨNr ۆT c23~/h 'BcQrO$M_4xZu? xgbd|qm% ezdr?JK!G_+Kj*l ?!UFNW]F~~' ׋<+d-uqk;oh@z~3|Hm;"]^ZpD%\+n\ @_??h/p :KcxR9_j7&`\UMMvF0Ce3}Aˣ -xS׼8K\ < M%k+Rc~,R蟴~z+yc qVyU#i{ڜm-լ59j Nj'~Pۇ4@zOj"pz}(})i<ރϥ.@9?ҞnGJh :nTy}h%OZbd\Խ[,aAS48=@:.3SA1R(ڀ9-I! ^99>"cYqb 򠜴%>S޺ __^a$ FE`\Uךe73[?4nId2n j>gQ qiibɕI%vo\e:\5h^%ҳ+6s$־XƗi5 C,ɱԪϭ}Ai="t/LӖI<:]dž:JW:54MI5 7K#G 㓚 <=uD+GC0\#{p"[|-^`iVԅp9⽮LԴ-Q-:H #JϜ=GTx3Mu2$pY!faީ隊^Ϡakā o9Xq*o[Oge>g'%1#c;g~Ğ-|=ʺ{j, hjUT kP=zUV$<Jfњu<=9'aSM|]&ӣ{i$HS%%s]w:|cCO2䩋ʙ\H PS* m3_%aKب9n=+}]ZLڥֽ. I%ل@KcuC *uG JUի-NIZDndk7$sԯW_o`us&F'? OSS~(/^O;Mԣ-m]NPqn6O=3ROgPSG펱`YbVAqڷZDjP:ȸ2 2>?i!ӯ&g"+l%tkD8]>=iMSFȸ0@ᕿNMIbe{1 ) 6۾U0#[HbŗkJ D4^Tqp15R6ϫ:ť?iܱH9A1'kX밦WghZeƣ8&impV,n8dXnn˪<7nB"Y øT׼3]m$/!#Aq֮_xZ^ۈ-dx m@8d0ɏvu&p1oxB$ G%W8tpGg{qxn3ż3'9_ F&ms\ %°e2(#Mow\,6 qInvI8wnFpCUkDyڎ{MbEY98ݸ0J]ƥm z̖3L-hgMH#!vo#ny5xc=:ffHw@@<j {w =/"H u18^V=oO%d[4Tf38+XfM.p-n0 $H?wa ?6ܖ[k)[0>ha^F3x'|@kWZڅ՝Fv+%rȣ|gxz += !q2o oW X> RTF6g]bV|6VLZ{MKV!#[MsVIuH}"l= dwPOycpVO$TleZ(6˜;z~ץq$5m/LxI c+Nߔq^k^jP\ڑh 3F$u1|$.$I[, e2B (Wo&5=2jjw/Ffӥ.Ǿ3q[<=x1ĚVШdQV67SsaOhK_۸nn?!ZL+d)^F>l?[k/{td񕐆%%[[VDǖ$Ǖ&zivbb[ZRQUݺF>_1#nzVKxB+ۉ[5H>v\!%s") N1ާ>l>6f;`118+3bOcYX]X1(P\C? m;duyU$ќ7|]ZV_<9pϋ[Ak+•7@FϨĊ=jلVbຆ51^,74X~kVzv/ɷ$\ۆ`,߸(ƾsš|sqHbIaFe%IH, )8$ ;wsWIvᏈyfd8(ֲ>$w,'rFFy1?Z[j\s[E, BV 7QNc꺭M5'M: k`a ! 0烚ە>wK;+4w)$q1A`⋜"UiFarY 2:#5kzא;"3´qm='~oW7qۍsn$&@WkO& ;=Vc.=T3"bPBC׭E}OX\KjF#8%NHWњV6z2]됲sчҾv5-u%խ QA& 3د]'?hDžuR"o3/{` JS^6}Ϸ`g4x) 2JX$^ K|Ё[ayRZ2|ɂscxIoCWĂ00 )T3E=d]Xد2*?u'^<*^@TnڴIyGPx.O}Q*V{~OY DBq;Umrwj!JqyS6xgjHld}!8=q-I#@GlUDy iC4T(nMnʄeb =k$Q}zZij>$Es4k1 01rH#2(4+I3Yk5}>G*?T߬s U*|\HB1]w4_^[E-%xix jZu夡q\c* }s^l޺CMTy=BӶ+HemČFP2p?5\FAݽ#qs]$ԭoI#wΧ][GYFPpҴr.q:_‘6mmHфa+G<aҺGN3X Ag?63z֝ zyA P6~UӹQgZHYdXaQu?k̝FަViֵgpwte=C },m¾]%w ,4ߴ%NK{q Jyp/h6DΧlfbOh ڣッ]8$=@01N#րȠ risAޓ.:zM?zw3ڢ hz{:CӚ-NhRGI1w4џxÚ߄la-eS S*1Pc88V߈psߋo ]Z[v#3;_ljgzoō'f_.{tQp] 4ܴ?;|e>~]5/_ȶ\L8AVruVS3_26<_)*oxGJk4:m7HA8ϧ\tz.mSX i;o읥DK--mgg+HTw?og֚N: xn?xAsM`@F+/O ~.NmGvJ]۴swj"tlm I;fP?gK3}sCH.X&=yhTphct(Q'c~>/쏠|eokiixg6́)NW?6:W_9|{oXNsPW{/wwiX:Ź ÐDDxO*(bPUP8Q̒v}?> kz^0wq GC=XD؛Ez2yHg+ៈ<1jhh*~SYYpUU +w Y'1K{ǽLϵJ0y*#׀OqjNzǭ86Ol$dS}N >RHsL*s"d@^ P-> xS!cV IT;Wqk;Lӹ߽7`=”0VCR`Qq@Ü}i1) 039FBGjwqdgԄO@(#1_vRWp`J鴃>INTw9=9WYL1`sަn'1h^4Qx<;6%Tt s^1HG{V;##9ҪrE9=iGRpsuӔ8n:uӌyA׭99ѡbU "$d>l+}b]K{}O@}dP{'ۧ -8=zcB F vk+qOn٣TÎ@l}M0Hn۪ʊ ijkOG]{:h¾㸞XңlFm@(=7~=/R֠L,r勲mAƝ$k oZqD"|n #80 A}oWo0A=+)ޕGs}FoHg&dDrZzc+KJ!4xܴ@ɖ :麗_P%-ET29HCqYI*+e6)XѮ]T7P0~V83ʎO< V5=I=9%r"/.,ep9týKPkm*gǙ5ԋmm@xk1e5 NiaE/Nʨ\JR>.)uhhcaAsọb qrFr^CA𼚲ķ2^5CXLH!%?3 gnԏ|'$DlF2mE$nѴM-P&t|Je 2@13bx]>SC<.BrrGW)*L݄1-Ya%r0Q&Q5RũQƑ4 d;B1s\wkf1G^Zέ0NzsB-oM4Hm D~V^>\W|!帺 =a`>UHyUXh~-Yx4bis 4-%~^A#= M;EKIPUvh #4dF8.xO[6G]<$i.> |ˆ]OjgVhScsR+[̃d^C U$W5GUEk%kK)2N~R8h} wh5UZ|[d$|ʆ񿄮y{Bm5pCmYm&HAsRjk}oM2x'veIyh 9 hi:6S:s喆Sl Üw5>GGB$T$>wc!AȮFּ;o\!mZG6Ѣ8SP 3Uʫ͕- Sfx=͵J2r#;;Nil.ܲFmYTldgqϱ4FCQ:q%huXoE Ejk x#PyΉ10(F̆VJcr85Fo?H|?- ] yL͍ґʧwdU%kOWu=Y濤E=%Z+cmWbH䝬2 `~OGYt)x&,7('GY2BA֗RI)lyjH?ݸdq i4 >hOrK!fOhӒgɹ;Bul($Wßs+_C\Uco<[I"aAwZݏrA ,BkFNU8@?րxpM`0?u㤱 Y&J^c=O^b:B[/_ko=FV17%zG??\qs/Xej۱ϓ'~{ߊ۽"m:6MaG=yK^"lXHLˠHi`eAD*Z1=g; ".Lp!ZR* }Ԏx0 :LPOU<Dl¨煛}?"'sT7qzǐ4>SҀsҔ.O';w Bץڞ@ \zӊ)$<g=Jǯ?))R0*20*Fm4^c_ ?otO ? lY--샍֬aw 7y_ >;ǖ"̶Ws7,L"1U%P)v4~5j+4h\︿0-^Y7?|%f {'&l~_ e߄ c4ֵx 1]]Ec5S\s%=,u?&~ XmY5OzhB6sYGfY+0A gmwSRܸowof۴6Ҡ,zTwIi3jZŧ#wZj$wqQVH J9zW¯~=isxq3+72[}Ȋw*+u*}#NFnŃxGԼIeK9]E-b|yI޿@eٖ?(sFV(r,c~ : +T=j9cV@n ,ÓK=>2qb"&$)wLw7yR('p%kۗZF# fnrzR0Aќr9zKO@ }CRQ‘P  ,i>\LF88NiHqfANA>6֘&8ڀ~Ձu.z4F)z_oM9ϠЃM\uN'v'=ji!ǧ4rsy7 j4&$º^\ Dz# ,I(zJ?_ֹH߭1O'8C_jnh^ KY󟔎{Ca9 T<_L;yW'B@> w;A 8'קXe4?1-;k+|##~٧Ziu'p3Օ]`ST^P=GXsǷj׽!qj%y@ n E1X#,qT+NAsMteń ֒cG$s+VI?rr2#VbîhBu =t^FNI=T\p18ºWê#6"?lF,V<xޤIW%B\kZ%, EgFX8- zHB[麦>4{{iI 3Q' {e| sza 8f encc'܁3RQgaZ0ELeO,Ȱ.@.e³5oRUЦUl HG@Oaj6a[XK0 eYn6p03ߥbj:eF:[zzƬN,p-a{y 2Ux@d12oاx7IH.LdDb9+a0zVZYZbK[+H VF:,ǥXh}Q|ٮV7F;z p;#]roAԺ|dp;-? @>FQj1L#2^N$ofֶQd:Ѡ3!2ノiAo-仞cY"B7n>(NvdykR6:TKs!Wݗ,|w% ;:SK},tHa2KvF3ft?gKxgDnl)#<+u}"\j:Vb,~d18=H]{4Z>"V+koVwf|qCo-wX|LPiW7 "BtH=@li^]L꺮y01  yc^- BD1I PN8C]W@W'}"EȕM 1;΢mP$OlK,uʏD F ci̴+ќf^/cCW-B ')߅b>Ʒq0|Qي0 FEEi}\[l\3ҭڨIYd9x[}wι?0i'eID*".AWLy-PCIӮYFo,k-)ᐣ*ݹDZkɃi"$(t H1#g`o+ppn9Ac:-?I>*Ck>է\-^&epX>]ßA_zr퐱$č#m#$88?>uozkg70 lH@oĺt2[xIm!KD>7kItQѵ; {gq,RU`y?sw"HngՒKojrI@z~V9 w #a]vM#]3$.#,uT-R)peVQ\; Β@7,bCդS׀A:|Q=<@_gYj$eGI!dNFX`l2M:}~z!k^H$ j&麞;~fQ-(&2L+)Q:\'3ɂ:f\&/|W5[tP,/ YjB0d =2@S45XmkktOn"@Ҥ}sYQɨ{%Ě%C#5nD+yB8bQ[~Ci(*w%²0>|uDCxǣ tQ]cB?mà ܡXpC5RvW;0g$y%m6N@]C#[y\qfK`}Զ6;w;aC":'\eDi:=qjsȸfQc+nF1{^|Vo;bcn/Χ<:i (f O/J4%_C0:.Fn2?1^mO>R|?q Ěї&JAyP>=ksCpsqpr^\?(ir<ۮG{̇qF]4j#%WܴpdhRd9DDʖh|`1Bs`w8'9spO8Q@FXIIj#s !z}k&5ğۚ\ 1~ H=M};~T5{iW:o`J2(MIXޅgs_W-Ixftt Wqu[_AץxKcuucamk`EohV^[ +쯖(t˭)yfvgQ2t7R?4ьzPd gvhZo~:TF94Oa@ &2Gl~ӝM8g=hGN=sLldJNH {ӱۃNigaɥܧ.GOvhMƔ#ޝ0si?fB@wJo#9`p{Cg1@)ZWz68rq5:s\΢LzceWcJfH9 szS7)4IZ4N~gǯQ9@`2CQiSp=:Rf ͕\ZaI8V1ӌ`z|¤0'9 W\bakm 14rv=tҏ*qTp]Mej$b;qy+:p~Y`[{ў9T6 ͝^{WBv<צyVvoWS[ʌpwZ!ȰGn;FLckYۛ諐%a䓏Jş1hCן[Q{"D= $v.B:ec6ߢ'~wܴhVw=1}}krQ5{umn鮮n_tI3Op+>Xdܟl{{ .S*gҟ<(bb@(?9u.;4y~y᰽_vo*@:R9 oYU2GҾo3vϬl裯Agx63iZoD,uk&$J%d!cVl =kmlAW<r~Ce2 X܉/" QCFN=Wik^x+=hX9Ad cH;{26A<-A66w ƓpA;%N+,t}7_V`1}$I˓ h‘/ ʾD7ڝ隳<֋{kF&a$RC{}{Dhn#yTc23ZNrۅI(SIXUK&3$yniQ OX{1޸/IՆ}OJ[̴ 8pNEze_N@5; ξYL0[wp`Wp:pu;fӼY1!'Zp)4qFV3IcLXr&qt^>!Mq_y .wN<>4ZR|wb7)sAܧ'+`I'n<*4h-doRAI$&%{- $}x]ʌ~iݔ:]n^ ZUh$ÞN'ߊ ]gHi^-CRӱ+SiU,]G εѾxpyQ>>q 1r?T0=[EjrZ2X鷖}XR8ko3|{H+7p =$ )W ۸ kBh[x mx=z5ns`oCQ#2vmU@{ViR& ^+Y"}?8gڪAǎq2!g(z/=*?դ}tudfe 8WhӺ>A/B78>~MJUec;nZ !۹c?_F{yzz ?adکٲx?n/(?\`sjtH:VCM=ÒvԜVꀧ;HyVX ;⬡"wp=)6郞ml\1SzU1<ژWH>csҡ0'5^7hǮ;TɌqSjA:S>ԁ{uҀ2t~ sϥzֳw9G*AGOH`{dޫ' 6v829?^}39V<6 =cJceN$g^7 ;T8ϥaT;8AcXBZ@0w7Cl%3g֑ͷZW?_F[Ь-}8 q&sc*R>ď |2Xs=`Cm#HG-bht5@PTF}dq=knIdd]3I!'Ĝ~4ǧ~rXI ׷Go8U>y_]Iwt$6{N=9ڶ!Y8xW?έ#@Ͽ"zquؙ F,91ziKr8!!8r0r}*UV,J(AUX֨t?隌#!g_.. W덃k rzz+wwi3sR׃5+|r5N3Gߠ^,ZMvr*8~kű .AQ׏ֺ)L8B%H?5қg-um:Ğ֧j. 7LYXsR\ ºWZ<-h,&)*iyeG9 0r+`ˣcr GB=; / ks80?o[q_VHGq^ՙb!iEҀozs#WRjziZ< V%)&߈b¶WjF.Yi@/o;^H9789|\y"m_ ipMw>ցb1v+N; Ux叉;>ҧ];BŴ3L7凔5Ω'5inV<W+18Y[+Cǖw!t$K!wjpB֪72>'nbZIfr?92PyovpFk1 )&UJ$uz6yk&kJ34h@wU#{wZgW˖[bdhOI\8w2%^&rkm.!`||$DsohVz QڭˆWQՁ]!q"oZkr.U}ޚZ246⡸Fp׆/JV<%!M!8ў#ix\+rX9V*e;:ѕeee-N.#8d Fiוt?2duLiמ5>mqܞ` fxŏxJX"݉[uV}A&򜎙*-`Լ>mugm )}4 !mB6sBױ)%͹۸"m*;xnF >1`b5Ci3Jւ"N9UĨ01H^ڕ B=9J83ǧu4{2~njHcǶpsm:ڟ#dl4W$ gn~7@XzdW')|)xŠq5ZH Euz8"́ϓ\ dd1DBj8R3t^:ե93F@ր#8=:GJx zR:n ԛ6`M;Sw*3J1*%1ص&|!c+WKv9$8(^F{J>M^|@x ^s6`us\7GE -y/֓gڃ^ޜ"dqN^:` a'gAN'=)nLc SzMjy8RhiڏsMv}r=:R_@iN7\8㧽4=N3w0Sۑƌ?7c?֤u1F3ڟ׵ LRc1 R@483'SBUhu G#IxW Oo_ m*}М5owki~ОguFf[)uHG9g M#EmOGpAּors-fE^-c﹃7hdћ 9863J1 R2dzG52L@2O 79zM ׼S_·, ӡ8P|:^5P4~ʏd= B>r |gq_jWr޹G<\ YW(ڨSq g^< Yje]5Kkĺο=wm8 EkcuI# T.IYL\:~褒2hӳh/%n[ s]^@~ ;)'͍n$R+dϯT,)VѻT318G|~G1ӎz{4r.*Im='d[/ R@[ \OF }3 @ns?ZoAN2Oeoz`/[88'?g?O-f9b2=M|L'}'̮GwZ.Q0p0wwB\Z <|DM|'iX$C<)<%OS= !EnOttqrtvf;^n{e*Mݪ0K'%Y7*@<`ӵkicVDtR^O8m UOᖵs7˻(Lyyu]۔NVURZEFX Adrz ֛!]a^183ۂ0UsϽZ׭1xđK$ΰ]ŖhTgoq4ZrYXtW& \28h%4oK8deY„vS6nzdm)l`u) _Cymꁠv'lAu_ij2Ii95ZnPXV[ 3W9Gr2:&:^e۫Α+!'?#u{fԡ^Mt6LJ$aؘ )fXwh~ak@sog+@BBRiE5wZuw%]29,)ج4Y-o.5C4%f#[o>MzHO*`_+3C|?||wwY HE%@'ֽHcmKoy R\֢j \UALā{Vn%yv[?j Ф}!Ky;[x|=Y5_5?nrfxX$SԘA.σ";oWY`0-ԌW$30xóMuT5 idYN$`9qEǚFc<3RHR&ԞV gݑ]@v>֏8 uStS VٟTMޖond)#8<huƦ ,KopDȃw,FNx9_^%еmcIk=GXKT3 9HwQkV(TW]yETF/K#k}5O.Y-#08ʒxcOZ%G^f,:p[ݘ| r7@3X =kKvK vFFvLITz֓}&Α$+a ʀzklo4=f;9Cs w8N Njc\u6rW|7R10683],Kis]᭛͌:"s};$mZ^Ԅ7)&窩S^?B[om<[MЉd+?"vΟ+.9ekK XTy>jnY|K1׍>#~55h|*W?UX1R~rO]9c^37LO֡l(cfq&Fyoǚ$2A=3j0CR0'sրpqMN}i6.L9*̽}~0;ݞ2P¥$m*d=yʌ;ie]Ȥ#{SJTYbï5aypg3ty+'ҥ,M A%tJg玴 1/h!%3 w#5c[YXH\t5_=7jIA |,/ьf\mM|6.3Sֆr[7Fw?/R9 w28>S_3Zl[.h*ry,Gz}Am+xf ox"'<0)j%oQ~:e :N0zgXfc';;T{ ǧ|SqGz ozwCNH8F1F /^ >qED ¸o|)G>2yEjGnBLzGj?o'׌t[x׶Gگ9lr?;)1}N/|dĞ+%ijN 4u|v AW`~l nGo4;4/M<*"&3+񟄬}_x#Qe\m L ~_Sg/ql]VxVRDnѸc!XpH>讝C+_?5$ovJٿܸM_w0en٦ՂJ̥v@C`LUgw!U@ORE} tk}吱W& qY3T].NIGx `ÿ>2ju]>OEE7Hv}OCc}>÷Vѯڭh F|˸(ejՏP~_| 𮱣jz{xƊk/ZDDQT l$b/_ umfLȌ%坒=^Gz|f~Ϫi 髾 kCwe1ݣ`s`8C]Yp<*X2ObLaYx+ī:5ݛ3-x ~U;\ "i/Z~ ii7Kq/i 1\7 _þmniu'b~|Ҍord~<~[G?0{e@Cj0cM 9 0I "7 }{SA!*@i\p:mi34o )33M=j0O>_֔ugNRF2@=*,jhO(9-4y~|9\=0 \gT?.S6ҵS?֦ǥT61Ps4s!y$;ݤ9$r;\Vm <nƳdBCǹ[r0N@'_KRkQGnޟs zf2"'?γCa# @lS1gLNxsr}zII0Ϯqȋ v8Fzvt.w0Sǜqӷ:JtN9kR5D Ϩ$g'zhɽL#$p2?5a4B8'w2xQ920#WfNdn==7%p{H?7v:sǥElvGς08{)%WhF8gbcOvuVB2:z=zXd_!F8'ǚL3x{_ mҵ6XnP¿=9cI8Vߎ+O 9N3E~~S]+gi!$9<`|o.})lJ?q.Þ+!Ƒ |?JKʢ܂?)q?C]|Yqӿ>")boa9j6ytY^?90i0s'oҷ$%?J2zD*YJJгDBN59J,/Wˑs Hs?S> Kgk-ķ*n܅_3=$EOxYҎe6c#G#9힕Y^[QSe%f$u^ {KSQv^/|;z|hn#NfG-bo[;Z5hs%" $+ZK/l"˷`\im HYpW$d.z iQ4QSkhggySktuz]J+V>]Fiu[Q-\RtFM2݇+C v%Y[۽6-OL$6h*U?%H52xB&3%Ҽu|Wj#x~r:NHdGCo}i/DZ C1p@?S֛O0YD_h8>gHrC8"-R]J?H/#r*ft;pG `it]"Ap)`&U8yKGCKoc_Jy:rIu/H8%>5KM.fka#opF1JeR1׽tkK єQm擌 #d$ kyl F/A8\Ut=| nHGnePBrp]w|V6tuɸ]W`LOZO#Tutu-䷗O{0I=qX‘ˏ;>ھ0QH>fGvo2z :V;Nli.y֮^28g}֤L(^֎`e(V8x槌F=IT23U,ap9QozGjx*& ;0᳚vxu-aSU9O]i΃h#I@OCihd.~ ~zoG`m[~36rcʿ!m}&o~mZhd7YZ(aEŔ7\[q)KP]uFTzD0/٤uܪOxt8GVY%bkw ׆FUS+_n*bΒ]: a\eT1^A}i#D~Zsr_t[m(.2WJk;5֓V2.u\ÓB  1؟~!|"G?ZƲb7R-8Figpuڑ˘͑cЈ5e|>9 5|A+ xe~s6_5:~m-Ӵ}qoK!/qn$QfQ{-ў{ǚv[TP϶& vn_fׇ}nHu K{NXxƻx1]k:$"Dz= O>/CIr@0~VբFz-k&=’ :q$fV#s2Qce #c@#SUZRS]VG".Y0zgx#Cmolmn@He?, cqNFHxR;:Lw(dP7_b~+|g7xbVX[>y0f& P=A/d]Y'o? goid.5d|H'do|c=7TB͒;!<~L6(0b?c7ڿmHls(vM'Lmh6eaf"iE"{_ <~?x?JFSnBdg8pw#IקZiō#i JojQpsƐ L>#}(}J0;~"pO&oƓ8qϭ/8TcvŒܞ1@\qFԊ=?u./&PVc( M.281{ҶJLgf6<il'k=_jf/Œ$8NqUˁԷ1AC 6qyW#0@U@I'Zn`c={uu!A>jhc9 :'lj:08PHΥ w=ϭic2p#<6950;" T~y)"+y?Ju䌐9=iNwrvy'@ 26Hs1VExKYִB\0dO7̌{~b\OrHTFI#MJ.,څg &/4r-JN>Y2?z*)y`` {jrY&ᗈ ,n4!o" #Sr}=wk6ڮ"C6 %8_`])y{cUX_V0`HN}kX"t^ \aZjo0Vוpa @ڤc=WE/q|N92ѮN=ZY\h Q#qH@##烒F@X 9C۪5Y\鞽8%:M#hcSM.]xA5*ETX&kk#qdzϽZ7qlVyd&Y.\湇Ư[Ey7*1!yH-4ˍ*ŭvXɂJ>Vsgú"" ,?#m qwY?=GOn A'^O(WJ_|,OU IpAy%A5G' _[Kgd$g87Pմ-JA]9U W F +|q^ $6a`@zҫ˦YpFcoRG9wX֌9loQ2Pfݒ )R}@u [{^8'lʮckF0m3D2nUp~~̹BْD.CAY2'ȣ8Ǡ:I $ ;3r#CLP=y^HGw^1BI:G-VD O^08V 0yp3\t [e1Fp]qQ@skxS9XH$1R*J]ą>G 9<֙"љ7YT)6gjȰr03_2|\VE,ptO_FjȖvSI(Ts_x\ľ [ {WJqm#/JIHOþ+_Di~2߉$Q a߼d~#ENJ(D?޹"d&鴠FKc?EXm#s]%Ċ<<湲>a:ؙᔃԛ"%l UOz 9"4r3 YVP2i-{Z0FB[?H7;TGJd 0OjVff$ Td0HQ(-RcvJ( eRJV>jsHTqzTP`g[?&ycS2:1h&k1J>X]j4thGRGOr%_, 2sjn> Rhw~c|DvRBU{GiYFϡ5ەI6>z(ic'SIodJ6~{OmX̿d{xģ Flw RG9rar3uOS^Mq̧ν0.z:*OG]Zl\ʞ:O^(#o=*̀c1r ݪ08r*xt<pr ?x v@#❷@A,> U4o2mƾF~xwdMrbrE6)T|XA ~7žMmE݌C%Fq0~^Ǟ7pmCr6b6ѾGQ HVH5$X}|*?d_2š](_aĠngD=:$g;W/EZ7\x匬̈4/8(8]MziHɫ6Gc^ۮvm.ԁBz1] ڹ]?=x߳Sڗw]M1 ēM#ej;H%Xީ.ݴU5OW#l Kd2[4jQegM!3='LJ WQOKx'I?}k%)6j f Wq8 z+Ng##^ӯ%Ŝr=~\'4>Uc {e ƒ h#+W(xRĽ:|F QPsO7]+2x஧iC}xLMg}H@(~i[7II$P8k=A2%k b _h@9y?@'\ߵ~Ξ0BK KxV 9`$W䇃"jWG 2{hg?Woz{M.c6s-) uDGZ\wie3ɐhsi`'u1֡da$sHK:ecO>3x*_x,smu&Aʒ tgJ զ}ct]>@.2xhx VSX ٴ#Nr})ߡWmX $Q;^s _:|@֣'V+ ̠PH\w5⼷-.tZ^E4HZ'Y+sk/^~ΞvPsOJNkDYu#zf'Q B3;bx_7ccW>(//|u^[[Y]#)Y_aꤏaA)E|.{-f14s( Rqޟ#4qh$%`z1|A<=Ú}Wte7i#ts XCr+:M+C\>!еŤs^ KNpd+$RGr9Ƒš !r@Qk+X|;fm9q*1_տxQEM4b={`sǯN ?>GxX4ia&s9k'𷎼;mjk:E*&8e=)swosEd/   S?DOj3:{SzzS:k4]-l Sx5z ל>c4l~46gTʹk-K[4?^IWPg{?#6E*?9|3SJsOV-Ae؂y"}-s_OJψB8aC7dڂt 3q=^)HڮRxrGBT=1Rvȧx:t6xvL |*[Ȥ938#=YcX8=[F#u>Xլg^֍TX%ܕ֫~Yld޼w&#lO)=? 顕U2N=;VH`=}g*ߛn;Z{0s=2n q O ,LrGAQ13:m^O׮hV rAǦ{/&r'͞9 s:a_.g CpA 9Ic+`#'vx\ج4jÖGn *3GE^Ռ:2O ʬNAȫsJ$ ڿ#g2^D]FUBzWghS#Y62CKyBXnѿ1Q9c@6Ty y0.$cEuZ5TXpF'ٜ&R'*{I'nrGCM95v13r0;c0ggp6G#'|ݴ ,D/ 돡&RkP G9#Yg*=;j&i6HXc<ֺCifz99HI*!ݻ)+S`/0;RNO}+͵{AlfO=ps鷳-$dƑ)'a:1L+pw3uxK1ϥyy$Tצk9~^W".չ+#m\+O:6";c[O.̒Fvl#$swǡVm'lFxR9$f遃۞R{Do [hs~UkfKj @=[%v|[ -$:WnI^k7|ˆ%A?r?@@rMsFpq}ޡO);6;6(p N_#!xj-h@`ecbp29V$ L)$'B\L = D?ZbpqR) j(ƤP:qҘjW<N{xF]oQ쒲I pʜ=Qu xz8u {PVjo|˄-S lGl朠c\ga3>)GVe@<{z+^Yf*d<@#S$o6:T9!=jd3p[JZ5AsoxNxd4`}45oOI n>*;mV-eYT0*N+^.YDfxⳙDpNG<w>q5x|ã~?>xOYtoi4iYv⾯ heKidX2:0eaA7 nfTz>,m< v ?3Og&^n;r7R#6q*0$ʴ e!!#p 볯nH>J]xo஬tI q4-!#%Kɵb!T}q^8nO|K <ouop2DbdUcv\N m~ڟvGůYRڵ@%,,Y@>=~ؾGW ;+eXWˆX>Xw\=,(pᲫZ /g/>,|;OfyRlb)E*89kO|RKxSGIvMBrvzfaO|T^ HJ;Mw|B9 ᧌lB}m]?.7g2kaːyq:kc;m/, ĸGd "+^ 9ھ=-V_3`2Fʣz\Cm#]C)}]~ߵ]fIE{=6g䢏]W?c#!zżKciu*R@l`z4m=OmO"kVz,\)xYw'l?jهzN8,Ua6Ib|A]|/ Eg얳HD,Sgi> I{BN&^1١4-?=hكTjIl ax' RA[oݧ/er"/<1\jbLW2FFł7P6:Z.eiz-9/앾 s9D;+\l|Pck2^3w2FCF<o|`|i]H(UopMm'`aWP5'M"3KR3*{r>숉t1$5߲+&'m7?^6bHL9<~ƒ>2-f-&[Ͽ r<89M b~<)ɣx[ON`G >pF;{;&~|o|M'?bQQ6MmՋ F8tm ԵŴXkw <ڻWmix6_;*4>Dduyx>.m{rOƶr/}n}lm8EH7q}kfX%qXK=G+ c\Y!L? 5bl'1*F^pO7c>DNy=Q_ʥcsޙk/2|[888[=GT$(>mۉקjQJQ0:#8xFb~N@>'{PffJOqL!-ۑQzXs@F<`=An@`zǎSB%h>Bz `@?4 *X $^1֠Fk9ާ Lw?_ִw`q;Okq_01duV>^;}GN|çƳ~кm7XK'pnx@+Te\sP0zw_ ;Rwߊ7a9-]ʮ"BLe\2k_{m7bXI%A \qӃֿI|acoͥʴdb2Gcsfϵ6 G^OZx$(UMW;Ю%^QYXo#'OJ#2bݻ6#|9_j^4@Ԑ%PF;$xEyO6G$ǥ]ZlrXz3h{rF`ǜXw mk G i[^VmS0O'V^\܎8 $XeI)$qV;l7 vNy;OZ4gUbY( 9~=:hg*IO$sTho2C[rAMcɪ@ѰsϸX%գYif Uzΰ^-GO[D/){縦I6|LdoPݎP;W^ʬQ;q^[C(<:tWN:g7RA$vrryy,nGRwȠH'zv(A?J6oSQza8TyĸuTFXcX=}4Js1?*c[$sKV @$O5WS~49M ͎Ao<;#fVY;{wٞӯ#d_׭[ޑcqWb.vNGJܧ8L{e991f$Ȯ/Mq9S+`ugi7M|ugS_LT+ht2k JRا7?MGKY)T_ƿ>Zxwƚ;lpl1,EJ2oBHpI,Fq}g:ضX~\M00[^>S5o93q>x\ٮn'R[',<>_@ 0VO|Fٍ7]}HT\dU<悪z ߙ0Ft?Lj> k| Ь`IQu}÷Syg.v_ Zc7j6qy*jʨ/@ g]{Ѽc.߷%HGs@p8#?>Prs@ м]7G׌  9K p$(B@==kҼ1Ǟ>u黸C1$~ 0'FgįIWS~i" 3,6vw;T1j޳vΉ*ؓD,\%/|A}RR=hʨV<9ї+LW"9~_CGsInܚH!q_51B~Σ#[cֱF@ǻʠkߍuy#X/Y91玕iT7v[ϛ?j/WNOiybBH䌰\_==uMH񯃵2K{X^#1u\eQ+I!O5/B ebq>壘OKxHֻxL,WHCu$0 zAJ&OZED [l'Nsm S_ٳNjn,ڎ;qIڒm g<ת/v'|ѪrDkF;}iNw~VLT*ïAWg94}pk%o)[{'12lI]XrFAsgd?|Y OƫIq"_@1N΃n[? !*xF_iEkFp=khNt~v~7~/iXcI /LheLdq m9>/-েǟյ`?ѭ =WV}] wΟɢ|1SR(Y%ccAgAsWܨG;S>&OxP6CHvC ؕ'J~W4E}f,& W%w~xsƗOM%}=wk$bBB;>ph^HNXsQm,xvwNFH$bcOs1\g~ǁ1>EUY9 a0 ZJټ7+{Mrw [_ry}sWχ?`2WWgL<ąV#q\/+ >A7f}uK;CA7PY{p2Ȥj2&6G 5SX~ -Юq<¶D;@8/ Js7I\(W|zZw2bszVf-݈̫911OP+&X$!H/$ʡv"@(]æz31d$rq#)fS;\Lc9HTtX`9 Vzv^Er+$5~jF3o9 vt>qE #'88's Fd#}Zn.z}9ֆ23:#ӯ00#mܣNAOκ+VQz\\LcnSZM"6<0:b0L 119jθɘYq<`z׵5y<߈TtrZyޘ?t<ۇ~:8;+쒠OQp䜪2O+F*TeI99<@f#ip:v#+|P2͜YaXՔ sѲ1sV4͎0Hsf)rp :)(€qzc1e"vy'#49q-מLP4eNAMYԼ=~p]8Dx;>i=1Olw8$m, P 1;T JetϹ>Gk>f"Wm0|ܞE~1nWi'g½[5+DIVo׋ʓ}95O$s5q(=G_xlfY\mV.:dv):0218x{;3=Ncvq0wE`$t5{w3E5꓁VQٱEk-;Xƃ|dG{ֹBƊgW*Upqk!s+ü=]?V[,NFbP]${~(X,.yl;{r=>fǖ$o5݊Uv=?¨#;,Q $qfԏ8F:*Z-3>kBJĆ掱4^p0XB^֠/٘B+#5 @gc0 #[Iy Kg8mxۘg#x 6Ymb]%ysk $NA]eH%X1viWc9+^Xi pǂ+-nHrԺ-=̪F. Hi q/2 lQ>,"'>6 үH2<_oj՘\ƁNGSY|[fqڼŷ 3$ qz,$GG1^YL: ]Tc]yԉuy@ IҬq hOAy$X!7l&xd]QC$rwmz}+(-McL> Ouk䏊[_C&+v1i~$RZI%Y8H}z^ȯ[ #oĸrNwgJ ąs/C<{օF g'zrAjP=}wӨl`nf΍FJW3]_Sޟ=$"XA'>K2\K:CK{^y'Pdq UUB;#ՠLm*=z~Gr%44,}ެ[=1Y.t95j0@7gP$qPIǰFvO#q)9 8vPqNU]p@ԟzxG$<)l@9>i*N}x` ֝@<R!ABQR$rjBOp}8( 8)`4 @J4 2?^)=zp}vpzwG^j05x'ͧ]w%Ű_>VlNvCS#X` (xf^K}|S67s_^xxr \c{N֞a$~PtWi>KW%$\m _dD.irVKdm"GnUL Cn_c~[GܑY̭B -`"8R _ݿ~jz ^8즖Ki4yM6Ym?tZ{oWSB< so:b-X)Gu?K=/]/ZFEow, In7_HGCkkx;^B6xjHWZji(!t̊GUJ#7M➟%ԡ<76,RH;x_ƛ0 gCo  !X0rc9ʊ?%xA4 m$ڽŬFt_4,yx9 oo{gqmz.6֖s,@8Ÿm-O/ٳN[|YYE@s L=<͡s^9ֹx#Bs'R~ r7Vv=$S]yPPa4cŞ;}VGҭJ#\8D#;:@A_E O ܤBFs3(=_ZjsiŜWsC:,8= )__  ǀ|5c> >;]K8Gg-֠ y2T_c_)P9MgYo|  E?1cx?~xS6^6zDCn'd;yR rk7Z^?KmsmnbJd͍zyO<Kc+'|ngw Mݴ(o.T 2H Ez$!B{5|SHtYˣxbPEr`ܘ۹OE/\ E>ЯO4+u=JJj|d>)YxT]%4(<5hxcpYۚ74υ .xKSx"vY55վ n`\4@z=MfmCN K!cl nāZ(>G3@|.FV5`6@6>E\/%y6~JblT> F_G |a<)6O Zƒ]˵]oL ORW0M2pmw.7.z?|#/jڇjvxuR:уo)x3SVrx#rVUu2մ>ltf'Azݓ~<_wmWGFRo#?<06@PG*+?#ž0=ż~5s&!g# ^Xg.K6+0hJ~!㎕KtDBҁket{oUoy<|R:u+}^Gcs|'㏁'}/Eg{ dxX)-k| it bVEI;EN}ط\G?i}zNF68cQWiu&GG{~/F[K̏9\j>1x{ϡ7TIZ\.@<":l;g? ::ִu8&FO_~Nm;V=o&VY@>dB~,@\@Moj][DI?}83__!?<NӭSr]I`2;d`_.hӾ#|XHt=7v+W sτO/²Hc󏕊:l9L_ΉWIejYR O+\⟍>ֺ >)&fZr9pkǿo68LJRھ$dW#+T֍5 +J%7r_n]V^ߊ Q39[8,#rE,x=GbEW\m'i ^#Jb%3c^>y˜Ng^ywY?Up4dI8, U4ib6Q3s4#?+s FsP 93ϰ榅}s5|В@mHh32$7'pMBSMs@zAh8Ip3 eض,^sZV:F2:+9Np9oZ6Nåj5$qf=?WVRGNzTs98҉dHR&RI?/WPw*:S2}JO\+m *#=?l4^+r:?kK"d6マhۏ5wq?J&DS85 ?ʧ ֶ3 I20~Onх?2N~S{^N9+ u9*b=ܟPw;xo\Sw*y %%ՙL|9 @B)8 r=}Oz7]ʱ G~@q'hH R&FrI?R$ŒKg=;zҫ _,r8# ΀,~ϸHlmn~<$I:T_'9N PBO|u9ֽuM6),f D$zӯҼ!(݌O\\ݐx+ hs Kz_yHZM2)Ytg<% یˌt*}=JU$<2g1^/@}<1DivZ&yٻ=ɫS'?Dtmn4WvkӼWhKIAT)w |J%Q ;zݦqDn'9۞3zjP{ĭ>ӼA,.`?tW˸&j7J֥vaF~tךcs6v%^FIp UUUuvrLq\v.1#dO 9 ۽gЂ;زĘ'i9޲n Ї~u&;+V8l#npGMKE2b)/\Ek6m yornFP;֯`U20qj( lLd_jX帱@uR@d\wyL%#SPD 1K#o' $rx.=4M"w:wzg8MEc(Q2u *%%$zzY|%O񎠎;ՈoEAN?&!qr#~G[gH2y㚕BS)\Oo^ k\f[1}+CeOjw #I(7?K/rrGb2Jw'q5hS5ә'pdX>U(Ʒ5{{g1n8ƽL s:U:8WK |#)}T8 _ sp3ǿ1wOp>Z8U7B2G?E=#ۀ$S;SHL\68 hb|~SO~?5̰ԜUs";qڥM{Z_cǰe,M> U& UfEClT1@=(}ր! 2v9)Iװ6=JtfHphF] ޵OJc+{|ǯJ (4P:;qOlF JQ[n8":3u4USOA\~p C3#.PGU yQɪ)ڹd;;T2Hۼp^ .PG]ɍs*i55 z5kzU&Kڼz`⢚6e?8 3{*;OެpU$ӴxE]z-CMmL76(hAVj7*ڻ?\6RQ5%feR=O}rn/Pnj^`%$sľ/~ viXCqzQx֐/8bbrBrcHeZ/xcM텖 B ɭE aCGVH 5E~>Zּ-7JЄ ]y'ha}F* ǒq|)Aݧp~SN ~ֿ|yPxcV#3f@{2F@\z[^??f>'5 /|Wt#2E ,Iv<+K]YO|!u6GOb/maPI SK1u`gsWԖDԵ@,JLdT82x_į'NtaWVy\=Uw-K Đz{?w? Y"u_EIV/#YE愘mx}I<]4cvϞno>x/E|v Be $zKtQ,/FR7I|POqW??^\3Nem43(b6V8'k<|0➟oyou%ɒ@$S19h5|_~?&`ckf<ʚ0q 8aUAYe8!Wzx7wZU;ⷹ_y-Ĺc$8  sF*=Ke1(}:vcohQ^ `ȇV^{Hlz?4}CK;+Eq*z֙nIVL,~p޿ MĻt DS,j7m*;gma,n<ݿ@޿^6|7hnjͦmQG ֏*𖑧閞M@u4Ab?R4r5OBdO 9??gO>.įXgZkxU$ Tgp9G ,P5*vq`L Siܔ̟ nh&*uh,i2\߅ 4Bu7qm.1);n0Â+sX-(ܤ|Ca|0j棩DdL@hqzy<fg.u5;sҢi1qMɱ psWw?gǺ+/ĭ"ݴ KPF|KnB>`<G8>B`w8ӄ]HvBzHݞHׅ\~d R}B@zPƽ!gScH-MtPbx=Ue?Ǩ֐z㚯%1۸lӔ S~?rrj֓߭@O!Q>h͜t9{smz ?UlTc xs^YI;eI _#cdjÊ Ԏ-†8Gz&b qI?18ɑYw(A뎼*uPTgc >sRO,O!0"<# 303*Je9U5Xœ92CuXPH;g3㚝O9Aۑ88=ht! Î:~'ҝ8djS/sd#(Py}j1,03Ӄ?.H^yj8#,2Wq9( t@B``Γ+nd~R u Ӂ~Um#|Xs;u([26g՞ʷ7J O,÷z>2mD%'qFiq=ة*71#}NVXLp>\;cyr=Iz!yTrOZmlz388^]\,c%tϥn{G|.'~?5o/#vX, yTx0u>Qm`zk%A,Ju\,ar`>SkQ2]W n/>>!>YdnL|y_*k?|YzGlY'2?'v& ٤Kp$bOt:g1P՝?$W Cl/\?קyf.Ө?^c Kdc#߯ kH<^ VSwv17soW/@1u$ Cp<;?ƚ 㑑93I {h0A9~XzqПǽ7hUny P;{0';='#'8T<.q*H)ؿ88h (t#hFbFg 2v;w$n;7WGim#%|~E'x쥆蝓\ڠYd8'8=+TlD8ٓ=ck__ھ6D7_{-jĚKw;7S,]Wў9ռos3LuWYQ%*y'MM{طN_WV,aңsq$d f25 kjIj{MH+'3殻Kk@07pN3k/'M ]G]x* Pn_,~Wwm#'_I2k 艎&c!NBNۡc^ G Βks1֗xGΏ s"&t`GQ[FME ό~*x^N܄$g*0L~sm9o쇬i[;EI7rL198xk=l3#w]TtGRǵ~*aK$:|YA[_bqSV6pv~?_ |A[xOܥYSk.uHN-SO52C vfIЫd}ZBL 4?zƍxo'u>ͦn^x幞m=8~^??Y-sG@K: '79* vu~~?ݶX#H-G\W--VQ(UF6Z-߂x R+h"ȑPРt\8IIFGyݠKJ%>8 rG\:.*yZH6뒠gw;)[qd|]5Ѿ |^x{k+y ;Aè$['Iz*Dd9Yr[kx K:l!M)Sο"?e_>Қnxr/,&ImJ4r #E~0d'#>})V"7IՐ.8RA=qPHI"T##i*O& &|Cxbwr?H_g!+$"MѵŌD/<3@I$W ~_U/?{KTlv^f,{VntO>?3=Yh Hr qm3g>Ac~%O;mZ[ȑos'PN$ͥCe[nTKՏ_*N=E<#`Jb<݅ova\Ζj@d{{_{OZEbʓlO2eH'cHnpjLX_?U?េZ[ޡ{kUCsPzfGnJm 7<͍?Jqަ6Wgfb#7uM9_rV4pH[u_ g.oď<'2;;&s`+߅?Oܞ":5[rF8FiG N~꼧5~T,ҪsʁXyUpy!O 7>\Duc]QxǷ[H,AbƗS' LW \֟FvC.04b@ 5?mЂ? DjiXR{VVE12y=;WyK9ګ;VE4{|eA2HwUQ.㒡l{AWi8'QV篽Cm+Ft/ +qs޲Ӓ8c}FtVӉBw8wи* IsÐ}A[̡C\_+rA«7 8<Ӱb!31U%é;u8/33 H8czD 899#Sq=vS[}υăzgڹ`{Pc# _`O_ǵiYMSrr=+TȓI0cѿw>Je_pXw\]<8?Q[l@vӜszz)%ftR%;s؎1@EuUԆA'ᚲ aǽbD-OɏAEN=t LdIF;'vn-rgcjbv +<qPgNs^1yPwryRe<rO_^˓#8¥ɗ>$72zgt 8\p9<K:qTn} 㠦V=(}ǃ=h۸C!8 #w?uNj+LpN?Zl$z#ڪ:!1c|Sn- €ʣ'uj@ f ʧ8ݶ!z}zSLB 8cRka!a}}p:$vI`213UK[FqOCblI($N03犎^};Exrx•#su4>xq) n#>\d@:lRH\f1U#‚FKcTKf^zLNn{8>%$frGsܚ,MȲ~Haӵ2g69WR;3&88MW9ˀ۸g xƏ'$r9_ !ly'F3;SB#ņ+_>PI$azUByQ΀ a=JaNli0Ṷά"&ؐzFZ2(,pvX-gyS jZsgwf20$y9};#ܒS;NH㷧Wv g 9=Ʃ_V3ul.$PGLgz@:^@Kr?w3~ס> trHlA%8?_ d(~c?.|77Bґ]~X:#5g̶r銳k`Sd=vɏbF(OIv=TCW j0/B= Hϧ֩۝~#5`jCp}OMmqҳf̑a\lcI.,U?JI% A^F 8oJκ%TP3qT0&X.!ڛF?ϭyֱF%gw3~U+F.3+!؅ZYan2E3 5 y$UsDFyLe=6?JΖ1ć^U|̩wLe3xLXy]r@>R;F1+}R6ZF٫˼]G< 7 jLօOڷ ?~-n!ͩi^RyeH{r$L/8a3W^ $6oC Qˍd{WlҴNN:ҳѣ0"wڡw1#l*%/ᯃ?PǬEۈ+yU">ZvxSoqXUx hu?zZi^!ӣ Ui=Y?1'vyx׾Ť.E3N^H,Is# k|fv~x N/ ,EHUy^q+𾃭|\W,;5/;hsq!%>ũ~n5|_<7qZ][^8/:› r=1_.7??ӛJO+f[Ro';x?2t?>,jO/όxL 'w~)9m,<8Pd9RȒ/F:cOݺޱMu,ё%4sP̌yWDžuĞԼ7KxQa{]̖0³u#Dŧ?^G޽+f{t>en)_?.؟O-?Ǿ$<[,Gʯ|ggn"{{Iͥı.[ #y{}J;[m`R B* ¯}/ƞ W[״8& l2HNU~bsc?7|B =f.!g+cڼGқSU oCoUUX䙹?ڵQI3]/~;.LL|ѣ<@*vZ_~O x<)l_˒@"7p{WOE|?~+em.m.Il*co7[a$L㡮}h OiұNETj$ו7݄%1|l 泧Ϩ[z4! 11\~g{C~C˭%z䰣׻8Rǭ|u_[DMBo'`bT3p[|jT8zܟ_신7KfCZYS,0ɏNY7 c/<G_ޗ~Ϛ4sK.fE,d85G }]ovN}/1XƬ='] ky7@nu >W0*I  n2@b*j-Dz[b䂅1p*V̮_ ?k;'{{[z{q^,o9$_\"gBss׏_;i[Fvpҹ.v9N 6@M(Tԛ՞0Ƞ,F)(ssӷWQH{~5GX97),>aeq9<ץt=!xoL>_;bdvz|zICնc=jr } IkrޘB|r=)R1uI% FHSǽyگ?ze#\s31"vفy:Ε9眃~5ψ`9͝v1aSa⁀Γuӎv CylU *듎} x98cwn88J TrxGӥK(ܫV#UPNw㜟TF< ; " '|LJ@=I89j9\z_U0(ǏAUSB uM/AМer܆e*xϡqHgR8XKd>q\ GˌuA ?Oα\aCqxzs<Ҁ22a1 9e:y*Cg'w\49(Ww^I#Hxq@SH) S# \'-?Z}͔"L[^LzUwaUe4 :T5"HœI9V#js<.3_Gs== 2c8{jS&ӷK`d=/,= VdgIy 9 -JGm,>TK؋,1q=OVi8ۊIσE''[b#sRL)8 6$HPn1\z4Kgɑ<F\TH q@n;c2\$`{jI:4svzqc@%6YGJA'¯m ! :T(96O9=ȫ@>ݧم30\p20yU0 ;HFA94ZLlĜ?ӵD2N7eV$* g8=6V,X)u>؃C|3ɉpto\*HsOJ9@ۊ`FL2{n`ӷQ @@W~8"8W&3;tcEP D3'4K,^W0ޕ ((Gګ !ʀ jc `sy6*9=h7xg #ΨݻW#zё"\w闄rd@<YCunxi.'=~ߗF҇}. ӽHxE\g3:"52h0O|1"䢒9kԱySM23Y# ǞHR鶳` c*|`Yrvl?I?|>am8pr9ӵkPI_0R{K×88Dd{ Ҿ 2qYpcӁ8李1Ҟ:S>S"ƁqR(S@JvO q0iN=tȠ/>o4yS8=K㏉ZMR}m2Y ɽc=3C|lt0&<ok[x1 4 RUʔtpzdiu4}+|]? RS䶤av'dM|5:~6OOI5 $lĪXӹ_ݞ 2B֢~ ӡJX~F%+N~0 SkU{h/7k=btĊU.FT'sho`|Yy IpZEy׍.$B9߳/=GW|C{8t,YO$]&;[#$WH~־%>2~+"c;hs00Hy#~_ 3é0tygov<ҨݵOCkҏiG{m@HYc xx,"մ^ O 0 _? u3Nlmf- KEubÐA G=Wu߆_ xV:Ɯ#6&9XU $cADgQ^0ǀ'@yp<HP uON74t=™ɕ}z^ |X\jCZ+ sow } ?05(- AI|qVօd},W L#BoZH8_ռq .c"lե\|d+_^56;KbWeAe r}1H3ޫKͥy|5I/ɕfR[Yv ?c_[g_A%#pq5:/hÙ|m |Jy>i>"$OHgeQLfV 6Ѓ^%yj/z/ 1q -8\`Hz W*oSЍ c*EmÿهG|3QVEcq^Wox)=x; }RjʈE*K9=k׵OlɁҼX񭵲yr3YN6EDzFűW kŖ/޼3_m1$˷;W,Tg ,"FNBo })!d/AgYHV~0ϋqyY\m$[@-WT6Yy8?\.23g= -*'cIq򫟻]:VXN*eәF ïPA~n猚W ?:z8c$F=(KhIPF0F{՗f8?]KXn H ~#+]uM$QnOLڽ2KQfM~Go>e9q3X ZN%"@IUGgқ buRr?l"W?08{An\9AL #bR?ju[d̀n+wqT+j\K|%$_'1 i9ycZ‰H\:q=ZA0'zL 7:RqjFd&N sU hr@բxPHfd] % $$w):M9>p@`rzIj9\ާB$GgH'u '-•ʕ8"\Oltp^G~P˞z]60סϗ trh(?҆y \rI<Ur}R)<\6 ^݇Nҕ[#yqhwhB&F<ɩj8 g Cm-  OVl8 fWs8hOL9ޔ#{L978>3>2sq# c‘Fq~'`XJg+v'{*?\3ބ׏_i 8qΉ=4:iDsgiv57.)eD9O*ڻ"ޓ❷'=MyB280 }ҝh⍤r)\n:tgOڐi=8拀EZSלcAҖ0Xis"𭚭'WI8< v-'<(b9i3cr%kykxzݨ ĬrwR3aa UU8On t# ~ʼy]3K1Ky9+(co0ʹ1pE.RO|R2fv/쥏%NWťB;w3h[d ۃZ)3148$S퓡=k֕V@!=SSgslG ,P/NAe7oCWij\O;FiUɻkcަMTmֵS;a㿵\[`SjO\U(m82ziFg <(\'E6ӑXqŭp 'BPˎF{853W8H8Ckk<F^#m+1t?|8t =Fkz5vTskAVr#NA;9?:ǐ%1nz[C1z8SbN@΁"|SAA2[0Rnb }}49Q,( *b983prTӏO]͎cDCp9%rWkBN2>r:zÌBݫf"1W'ʪ.3NHS@yb9ʨ7=3Z8rqynⲶ#T|2>JXg*͹A8GZf13۞~ QF&8⨑p>`{*\<cޮ6U0r2q8)9Rs񎘠 Y@Ix^8j{wU`d'+s= 6`x%$sҚϵX@';Gl/:HNӎNeXgnTV$W/9O8$´Fx HN}GҀ4Ԥ]?xۭP2:t>n$c})]rP1{M09s0b gq>ʬ %H'wkũQ; :ؑ\GMc*gm$*[yb>N 8"Gu CFzz7&O7 <*XfuT`x+鞸Tyt.ʶAU;VP1 Ԧ8\냌O q,(AIeynGT; ;Np7RO506# nUGOPGCOJ2`I=jM:@ tyCb3 V@lcWLM#'<>VCǗ9zczRB#m$?րNme8^)6pGzՇcpx8~#'<}(۬q~8X[{` 9%q@݃~_D2} \SL$d p9OҲC6œ5 =G_L})`:qВN֐6R'<;s`T8ހ <pdoڼ9_Z9rAcL5tn@,hbO`NIެf݌'zylnFq׀N=z"X*{\wÔ{՗⍤TTZsSמ~TȬ$A"B2q}GL7aFAn$z[sʓ9 fzKVѲ#e߂Ui%v'VNCѤAݴ*4Z)ݟ1v hK ރja昒K>K(UXzŻ,t/u$9rmX <yVz zdכUTBH$r'+%Vg@q`2FJsFU57bz{WIgݲ#=ko4ybxޮT=8msyZ1#ŗ1:@#ácںsK>-G.3CEtL{zփ‡UKUxx _ƴס"Io$sZ)o0* `?Jӑ={VG-M˅(P2Q4 qڏ3#R9jyX\":sSo ֡ݵvg"$`$}GҫD;!w$} HBy>T28)탟C<ȥ7V^p>el/TĥqGְfJW-ٸ']q?үOvO{cFJW)O,f5#p(Z6`#@^+-aINA=VbIS@np!I'~u2qyƱcu PK :.q`3N@[?*1E#3}ҳ.yA`Mk FNcP:.eq:44%I'#r 翠/6T\exǭd=AϾqI1P$l#N3MUr^v=G?+Zh၂pp=}+'8݉Py ?Q"RҩA ``ֲA9qjH㑑wr9{f5wsЁQ֧k$?/^1fR7c8rAq߯J% 1ߜ#é)xlu gzSe}N@߸n<;ddszddv%8i6/qr=wSL7Fă@^HAUVx6:[o=NIDdPI|2q|߆;]I#w pH<Uy#`?΀vv|9–tH#揕Fn~^L~=I ǽWxwHA?ȉWp8Nקv|ӿ^X@e14ɺ599bJx3ЭKڿ [le1d88kbkDS6Vߵ*ކΖU>PT:!4y+Ҩݲ^+9E#/\ 9PeX pW8T@fy{q$-$Oʜ qy yfjje֠lR =:j5ǭO0<0=q֠: 5]jiR{Ҏx=iN<:SxhHR)}}h`6E\qGN٠ƁQמ@GDލN?4pzSa퉿F{[}!:y\g=:{U!ߑKF?w8_?3 )# OJI9wsSp}tc>SFr ;1\R}x C֝Qim"4g 2ĥSLv9-߈~FinfXc܁XX ǚjƱfPqj0Nmea4^m.K1 H]|Czäm~QjZ9f%w(88P|UU֝c+Ud1y0Ic'VjXA<|/=}}Z?zrxH|  uwKKttqg=Кy cqC1AugmyT&}F &gkx)me1H?vky\2)UsǙ9 x?U]ky#"̎5fKY^x ub]68HMdw7֞4t#$pBf`b{i wOi[vF7{ʿ&y47/- &/S@05o ɧx &jBg|y^?k F$n..5rJ/ Q4N J1ry# VfVs+-鷽wU|Yzcɤ).BݮcɚHb{@e$hsج; , "چ'3z7=( =ALrsC0=ֻw:[eY[d']d4;Vq֜hDI1+lŅNԬtQHM2x#p;umuhsF d] (Wlʵ!bB\=Ey%}=5HXf \Y<g־9m#ɤ]]%HΪV,3ڶM4e_]>".0|86~]%xp4qw[k>hx5bvr hNUp9%6c\l+LeGL|cV7ͩ,ހV| 4rTq ^\7NU,q +6kgK`8!ũ\em&o~t3p7ҠOZSt!zu8w.RMfYQ#sub?\S2#^y'?hJy}S P' ,qw+.K>_A^M}& T?k_XbI'ߗQ\ӖϢuiLq\ڽˡs҄0 Z5f(#Dۿ\g۱W`5^l|&Ìr ^ɆFssU!"ϿX*zv8^yV@[J+w8iB`%zq1r 8GZkL9#׭R iR3ߎG` :L;Fz )*H\zBl8Q9OR:q{bGNJFx8=3?j`I#Ƙ9tr4NH>ǁPYP'; TF[ 8|q3_|@2,űqߞ*8Č 1Ӯ3kj1p8u*"Ts m uϽ&᳑\ Pv,s8A g==Ta‘},#zr?>;Z( ddu=8T`vpG'?z98S^x<A@-v1~5"Fy-<YB8L_(H ir1GPq@nv%ax8ԪZ07pXu>3_xЗXTv<\tqxsRHT;n_ttc; tGsGȋod) $A|Moca@ feɌ:39{q~]'NI9nNާ#(qdsPjAqϿ?\VU8v9={zcz:!;XNդ]8$zolP$j :ێ=1V*בTAyAPƯ~X@XTy|N:J1h$W`Tp>hsJRڝn魐_(SE}W{hVmcHd^MJA=~u a=SDiqڱcJ.?[E.zb8QbJFqf zy}iw `zucC';&[s~5;">1=)0ϭW'-zc5E@f[~J )x10О)ݸ֣$OJy@ ەǥ)7ғH?+u*KdR;4yt_ 䶃H6Hp*2##twOPZ5[}Y\âXjVSq X'UWA<׭Dӝԋ9p;kOjg?u駚=#|4"Ty5xKb. 貒JmaCrqdSOK+zԹ&sz<-\\Zd72Ac3H/lJ޻$ГԹt{ۙ,gdڱxI>%OQW0jL!m|:k3YŘ̅~Aǜw>?u iھ%ŢG)q..[[]]j Im1o? ^MOS\ Xִ QPofKYH?0a=?w῅^ύg6z60RN$8k\ֺV$sZAN+u*W|i7 `Ji4ܦu-:O=Gu>KY{QsxL<i|wn{pkD:"9\*RFU-CYf`pw44wR{ -ک;WPcӑOMkOf ecSֱDmȏzJR'TJw#O A늱o=r;u*fE^H*$Ur}*ծ|gUp8?Vs1jFnęc/801ycsmx=A8m;ecsZʻ*2@$4'x]6Q9 Xd@JF}yҀ%\8>* dcTqy3QǯrF$ Wꛔq׷S~ZÒ"k8m+ϡҺPz8=;cpCʑ};01fV! rO^Q9ZX1 py z) n#^2ԀH \w|gZ?{gRa$ 8a1$tsǧNh'8?N*HJ89 Cё<=ȩTdlR03:,Tc;297*x=UR2v':&לCQ+(\@#?Ҁ*{nA3ɥ2<#<1$A$uZU>b89Z_) /ZI i1z*0O$c#{Ur?x>nq@-dt }~yb+XAW,7  'ֿ!"+ 2| `׮ij@@8DÜzSQޚ+4K1Mp1?/Azxp#4AHiQpxHG#8iR35@ )p{1Ԝ@М(o֬>IFxVRN`ZLjaxu &utN H9~Kd.QҢ׊0N>ݐޜ̃vTw \Q. Ӄ(9s(,Oy#(:9V98X_lf<"s%lp|I=is_tX~T}O9fONiw)s`nQ܎e 9n 91`mcFv=TwlF*e&ZD `pBmzϜdS槝 $Oӂ `ێO?~zac~|&}'/m/AT)/Rž+gsFZڵF mm:h7$˓qko;2%seㅗ&.g{{;2ȝWi|'⼍>kyu@ׁ־jUx[JmE);ѧ7}qdX|Lʒ~zV$>ǀx0 w7ǿ\(}Or~l1 ר5:qޭC,h):$<8O.1Uɰy2=MV Pc/jُ$+mRq#WJ,IUpHOjB@FL $QbT` kC\"YF?]H"=CVMmzցuXΎI1ӷWt8Y,d?ǑWb;9@alpmh zmf 'h\g}vz9zFzÚe$oU~+2pVŤ AO|XVUĽWcğ*``f$ZwȦIDfl >9}rab ʃһE$h*r0>]de:}=sXr{F+Au6Z1" l*ĸ` +UC:gzA:F~<V5O*cLE&;@׶:`*ON=kbYt۩N7+('gcCf& TW#8vX=f{W9Y=]ɵr;I\ǵmdr toNc9>cap@yj@obp_Y i鎧$ֲe0g$s׸׭k0y#'ީB$_wH Q|Hp1ԁXBvms=zn#30Oo_Z &evn*ԍ06T/V 8<419q$Uڣ['ƞ+cs;yS*N:㿽/O-sqJܐK铐8g*cم8~ڀ۽`U g'?ҕFO!=x(6q {4TRszp:`'=t8Cs2@=k =O8cFFv\S<{Sž{9c# |ǎO>Ҁc֭*($GOօqjcCk:WB}yk)G1@_OC|e H4v%.nGيuⰛ3|t?+<. g>pjs>:V gq jsq{}*ۗHcX8?w/ 2(3 3H@# ֤ۖ)9?y?Q5&2@?=i84 "㠧JWG׵4ҥ~4 @R5h1RҘ )d7>FB*>I89=pGj\4ϧJ3׽?>ttsހ zSSH⎃րXFyt{)F2En9<y5=Sf Ğ9ISv9 /#/+)׌wgE,4G]k.K`Wx("@1'of:ayk._}3yYᩙEl{Y5v}/6d>'N בj:ҍ0 py.g7axYjtZ[4pW u4#l9t ZJ[8oqd: ;#7sNA=*ƫ`(uW>U2@ z}kiQX 7H/Ę] 2Ptqn֭6t9whhf`r9_D`[<]%}vkC֩Dc r*{v p#'Gjꭕv,=*X}4l9;sjlֺ)- p g5{d|U\6qSir( ީ-}& mR1֠6#ո3pY CrF60Ry#)17k{A$O3. 7%N>Cl dsۨhx_WqvRUpm9\$vs#gE'VF<Aqpl$,2둒kb]#գ*]N(nOJ `nT8w| aGA^-xY1c+-P84.49{K%Y1<]XvmC sZDs &u.a-;A*bjD@(Y, f򠺆Kg'%p@O`+͵5q!8 :v+&ffaFr}3ߍswI$}85R,6)Tۥ"5g_jQJpW*x#?HxF2#sҪit d(IF:֫+u9j o%J,v@7 iX8zʱ'GpT}r3y=Ca[:woXd1郅F9P ǿlzHZvpߏPjE#$:Ҷ#uv'p29?^+"HI'$/YBX3Zbd#!z{dl#0}Hۑ\JG8ک0/{T+ $OnsUL8/zUq ?O׽P8ϱ*c+#@#vq6ͪp#GLgǥM2w2ܞ3?$N=1%m9j,}@ϵh0h {~M$`g:U I*XVĬN tO ժB ciwϿ5-ȻB3tjxB+QBPy ӌd 眞UN3h4đu'Ϯ0 8n!r3g”"C׷\}x1TP8>t .x皅ԀR3׭5Stހt#֦r 'pנ?)d֔rpNG| rrrxӎ7 %qװhZP0q?=:МqGܟR~b${aT&w8#URf;B1ڦ* 41ӟGH *7x}hQ[*sLΣAۏ= i[x&Į0~A 1 SVV6*@#x'#2T N-qI#k_dp`|0QcBfi;92Cw#l"=TJ*"3$G:5J=|3W݁Nƪ۰7g+ \2ӨmT$ǵ#fxAf@=8Nh3M'ZQM#Ldu֛>^;@I<c('|iL烎hz3C#?Ln1R{Q{U\m/~{ӺBxpE/t ڌƞF<Gڐ*$ gH:sG0 x.ڔzs擦:O4="phy'9` ҥO4ҸCZEqҟzCBev'cƝRsP;9$c Nri$ny3\l&ʊ,]șe9p-t7cGr}kom-̍߯_8kڽHĜ(7Znzv՗X2/<}koElLH k#}Srwg*od~Q5+8EOqr7N:wU ZlgB:`9n ?ʼjգ1lQԜVpO5YYFb`ztq[6zSƁ8QX㴫7}kXmIeϯqݼ#{nyb=,wl'ywyjХag=^Ky8K`G9R;-Fu>EwQĎ8{cs6J+]>:XTGOS \dg)euP='~?Zz2rO?K@@O4m:Vq|{SB"¼gi5 F{if!qЎV5g`~PaǧZUP Y8?2M13o"#sqQHÆ\7ִ.2*}uk~E61uK]W&F*U\}Ӹ~+NXE/Zj,lѣDlVJk":YHed*nk$[eh|Y>sJGZբmX-A=۶l`y`6l1'3}k.B&~RA$r?ȭٜO, r2u^*% ߃늵zv9ݪX?6N8dֽ ķ|t91ӏXV̦6d )V*AV$jƹao5~fqqkZf8l;z3n|s G?SCo)Vِ#1z>4r b'-&\ ss Ԓ} _caQ&ǩӿ=l;积CM@Ҧ18 L桜I^px ↀǑ 8G<}*soNr=u2<sRБ1r8:FBs A#K$nrf=9P!7>q#9jO N1RH1zE zgߘi0ԑm]8yU!%sqLUUۃz?=G1'# g׊yl Ϧ40A? A>Sǟƞvn p3:np#vN qjй1j7t95Qo8.yH~`q=$EFN??JImYP1,0 sf5냃ATꥈ$NNz}?uar{1߿^ [qW5b籋!sUTtXczz^PDX\msX !ǨcГ>S׌u9Nzќ_@Ƃ ;TdtRs⤑ FRAJUGx`Hry=@ޟϵ!{A^Ss4 q?sJpRzf\g h6SjaER;PA=)'~8=3@—)sy@ }(@\{ҞO= zS3 ԃ$zP=:ӈ秽 li'Cƀ8gt43ր~`v斁'lS'z\t̜}) c9.9crNOp+ݱº;ܟAW1zd0y qvuG׆zֽs֭{-c m[]#:kF%SpQf+Rִ"kJ6{>(?aRR"bn޽M* nW3,+oZq76I!C/85ig>W=F9g͹=k` sVtX0MtVp0^Nr֢ cKV#2\Ȋ xYz藁\TB8Hj'DJo`K$@e}9 '\ZUn qg;5Tb*N氕x:P~G^{ns 8$10+U&(T5u{bۏZ ! ' =J(<޵Pވf˨&9<#HSeƓW_Z.u-ԗp5j^?>0k'3=08V;UHc)WO±;?'ǟ 3 mҡ3%)Z̋b*?d>=IBǯrq3EDO?ZoIAirs'yp6Yi2ɤQyǥT`X &/>1v%)/Ư<sOC9TSUMZ%G<j_[xW_|Xm{5ğ??I^pUï`~ǧکKy [;*Ȁ?VnPG܃'nURMRsq~^81 P}!r=={4Xv3V#5W#G<ɲji^Mq$=?tANH`zcX*#Clm_p9չ'p+`'9a-[$#ノմFq)(!Mǐzj?gx 1U*&}ypxy2׎- ۞^lÑ`;hNpAޫ39FMVB3sbMAKMNI^t4wO~+խ<\lx\YgcnR3<*`X+} qE:%)wWzpq8%F,FAH_˽O X-OZb*Ä92K6GNGO0ù$RN3A:~_ZcbEbqOHь 2089ʀŽxϯ'@'<sW1Iq9m n bG$^^$;}yY:\pwOFz+8[;y8=:αqwu= ?j xJ`/r(S*cql2s`H$w=HڬUn A3TLSqQW'#8>jBFO=׿jc2|@S@_V}#'U,27zc=~TIPr;U\qqù4cX+wt})Pwp힟Z]f=7UcSן]*hp1>v) ޳cOH>zՑ#\ 0y v'FA9yu5~b~c`zz`R )Grg4eo ۧ8ޤ r@xu4d1#^_֞'kyqJr_gA?4d 5;Nrx ߁J9%H#E3] V[@= M!Ϡ= @@ pAZ1k6:ߧL+ `~ W'jRH =ߟaK0r2Ajv8S)7 'd~Ub58B:G߱ ߵ?5 [[9GQ@ek=6IV*v[;]Xz|{%v[g?r2qT_S@$ǽWLU@S@< jD@IZbGO])#iN{Zv 1>98ܞsI ԭsRš#TǮ=;т jN}' |o_0 i(=hc랔v?JqZ1R{})psSRҀ8Ҁ y*CzpI?t?Ŏh)N0GN*]'U;zPp~mc~7Ps@ 8?^HuGZ@@J=){K^ !۽<~gc'iw`c@ՄAw_4 #=ƜH~4wdqA"0}S'>FEDgEpWa:{ePgaq&|a[gks֯f5f7K`^:ߐd*'K\$ڬ"=Efj $eP`W.v֬K~C[sX<7M-lu5 yosᷞ}à+|GjssӡޢGhTNpۑ~f9# 8u "6Xf.BB<9AmcQpVw|z*R!I$J=N|X) jWwjN$6^2iQ_9=j'qۭK:|@ 5b+#'ֹWba̬rԞ{#Y Tp50Yi PBDNk&5\dL*v+c}kxĿ`˱w.΅oܶϻ(zҕ-Mnqm*G~χi#~_>=8=x=8S6OJ|6X_rSΡl폓qN}-,J8Uʌ9xB*f;9CHmItǏӱ?tEW(\cq^3p0ꭝs*!ƨ7  }|#3<]E3rp\$@OkgLj l}I=Jε93]emMˣ,NmgV 1#-899 q:Q\y)qYt881ɭr&PS'r߇n*a Ax?_Y2w'?/LcU]IgwG?Ŏ:}>JÂGAkBDR2IӷzD裐Nq9ȧ@w b+W8 d{qS,`9w x+*>Q3?1жzh`X 2Nzc8"6 r?p8U!H8ǩҸIcG0{5pۏ?\K@sD2x9q>mҨaus:ӜcU+m%xsREULq֥b 0wc}}{UHf`Fr Px9*Tmx$v9\]YrKawXpT֪;s3+@P< q*5D@=ӧ*mdnTŜy9Y*9H'R2#9$閬8!I\FKȬ9Zma1=4گ_֓otK Ȉֻ=3I|k·8">}q`R;Z6\m z7YOzg֒^hҌjVlz4+vqZgac`hm>LepA&̠p'E9cWp@`@>ӮO,*l+ӽ5b}~x ޿JF^GsRqޚI';o) mScҌtH*L0ϥ)i8P!j\`?0  )>ӃӑK*8&AbrOҒu<1p{`;AG69ǭ7i?ƌ~0i9QN'+ZB2=}>aJ4qIҁY rqSZghpqߥJ?z@9XgQ=֯21?Jpb+ZD=#W<H>rŭfyQ~I ukV2:źZN0ZaX]K;SVB,ǧܿ'?ҩO\4ː{f mcIb<鍣<~~c~~1o.Jq˷9>4P[7l1=*?^};bQ˟һ ?0 /EUCgI}& TY ö fI4υ^ Jk^+A"T Z>w+$~ f.mE^Ts$YBrƾ_GkFB'\Ot.૛{4u˜s VȟPvq:`.*iCd=R{#f>MO^+$뺬?CiAI$0JiOֲyu4Zw>V!{s9ɮ UBm-MUK2V'8ȯl[M.gSֹkPcs RJ- }FcqOҴce;ֹH|YdwsW2  gRR] %:Jق9Qg+ ۲Kg;]&ѦE#Lq՝m$sr $PuȔ~6ֺx %Εk ˡzcq!/?Jފ;﮿lK[%p =:c1$ ̖c6N;sj$rlV9S4x# >ă r}j.R%H#p;6z!K NJKwHgWvt;ui|¶DDQpRyP3kVh"DF{@d\gpz8Z`XB cd]5M',8nyҷfg[E1(j2€Wy|Z]j>ѹwbI{p*]  H*Wr{ڕsU,]G oqHb%6[wSX`1Ӿq8hDN $ƣj'pGO]s>#0qqq]䐽<098KlRc9Xcq iKa V(EK`IC[D k2mz(8vTd/Lv9 ~9>x#-TUzzX6=O'?C[Rqa #Aӷ U8msr8?JFʨ9GXheldTpzq.@@9zV&KN70 zwb|ar2;zt XSl 99= {ycssܷQԴ8 8I FV?8;Ty w2 S'xs䞼zV bn#ZHt8_1]OБGLh35*̌:8UW `NFEP4=rzn;q4{ʌy8n1>S0 I9_q~T $|܀OP?43\uZ1*>b0?I ʲ#$y':T2#x#<8<ޭIg#9Z=0wcOx7u =zP!`OkySJ F"TV=S\ƛ'OC8Ieoz}Y ^X#M(^#ߵL28S@]Y]xWzye9b;3ǭD>f RGsTb͖`=OүE8Y;θ(G9=V2а x^:@8ndw<*frSzVae4+'=hD/tqq@Uc徧ߦqM,ɑU8'X.8 ;QӹRDU%zt?@a޸=wd۽{pFn pʃ9 qgP `=?4Q*HNO#?Z1݀~)yW; Ҳow=xhY1N3>3dG{֦,yqù:*)ٸUsמ@R\|~<09#q֮|>` :rfU)Qf-;ϧV_$^@3=֬.qzT'\劓BǏL@r?ϭO %z{ӎjt (pɌRާ[>nq1 ?|gՐT%8=OӟJL W̐e'' W#,i$ʗxѸ-ڠlIGĖ2:Ԏ嘥;UpST ֢xm^B*NyZ<0'00ys =zaGkFUVo)]sѐu0|~㦅{H*C_#[+ 8a>ڙ#oqӟO_Qԥ9-%kGYH>ZWtf;e j*_1ZE^:۶ioEs\is(cfx"}8H00d~8_ By`x,F@qpL1u}qF?AॿxO+isy?ટDp9!$zdJ@"b~ȪeO Ǖ>3!_AKd9=OS 2LtzUik<5'ו\~\V=%训k2}6OWHB6Wp:{sN~ #1K=ͳ?௿p_ZLl?ԷsZ`+N%s0wqRX U(GEhG\3\>ఞ $, 2G"s_b3 qSޖsdbHx1֓:gZHRk92=[+w(I?5ʓc0͂99>zzzӷ,dPuS }8kYzwٺ૟˕O` 9cc+Rkӛa/5I ҋtt?iI+IeuFWg~p1>k4.X sҿsuʖ/rF<\c~"ȓKIEZL=8Ҁ?X21_̛f=A sǹ*.Jʼ wcľt[앨NS%PS4ڗfIgH2V0{x(oݞ@:ϷkXJ$P_$r{RPMc#ZA?hOǟ/~[?>2Bq_Ń$^iX1לgLQIJ/ FGOL] R]O-sՓ,iA>0W}O/jЪ7]ıy uo6' NB=r%cNHՅg{85f;Hٸe9Q⭄58ɪݐ9e+?JXE׀珻u m?gl87l=+jkBrd8[òy3nZ>%lrֶV]_ʆ/4Ȓ9Yk{/8kv>Ĭ>VOگN>&GH{!$ u++xW}H,*Y"T wUfHI#'Zv4,o8fU|1]7mSs:_?ǽzN:mg$nֵԉϮVX#ۯ;5ũ;KFi.Wj Znӿ U57qowk.E5'jCeY@>h6j`.W5tk"{W#?~K~Kcx'J3u\A]q}◰>]~jt*c+_cva|Do7G{8n| z>Gܖ#?a>vtiFx[{*ZazW|Mnd2zpGRT0O8{՛go3X$K9ۥ+c] 3\&=jGh QּW\9w8AV\X*U nȯOGa f}Vyg{{H'޻eY/ZA?|'a%n<̌[csאkKMJqמ˽#A"gڸN4}2ݰe\c%t`\^q鬮eݐ@}5r6RfV@ƦMAEOC֬ \e0:ztCYf|~$I?JjE#\F\?(Fq8f;p:ZOtWϭ\3ߚϔ,IFR#l"av i! 8 fT}j&M''ҧҷ@1Ħcq'5j#k0 z}zW;};S ϥ#n H9 2O!^BeH8t#UQF$浈*8@ vǯSD00Fc JPvdn#ޜ $*38'P6__}zpF#?_NSaeLA g'191( cg\&5!6\^N*cqyRd~q)b 'T;hA$v`d߫,r#wݟQ] 79 p>+:~l+m92 .rsn\7۱ǡbѻ $0''N3SNդf NBhֳnvPyYqZ>fP Iŏ={U'O9lAsw9a'XV#qՀc`C`1=}h]F U~]'I˕%rp;1HUNѐ2py$v翭U31u {Zlc?{> 3?7\=}h1 뎼^*mnFH JFvAs0AҀ&]rQyU]?/ WԇPG@9?ΧF`#y=xxM#ӟzNUTuGLg)taq+,o yLg'#ϡhX7[C3d~ʳÄ s׾=*7ӜH}#8@<O?4³0:sߌPwW9`AA]8GOOGz5{x@2͖[}:@̀c`Ҥ;|#׃.iNi; )%py:U$oI>ҥxڥ'Ha*#1#'j#~%XW m0ۂA" f%7'el'hJff㧓^mzW3 Fvz|cfS`sJ=s' 1^i1宠HߚS'.&]CJ2^/$'\9WWB=x.]7UMYmA3ܦpk%sJ[~xyuKk5/̌AUa˛#2Z";æEx<QޯGWتGJӔne Y |k179Quqpk7S;pF1SLDp*[ɸ* ޳n%F>9q ܙ,i7Q Aa2zv+B)oZ$ Oz@AWk&[@kWyUrZIO8a sZɼ<: -:=O[+4DItZϽe<ހzJ(& ПluPYmbR`vȫHɌggScҖTT $ z%RQN=ZX1'qz^ 9ضwg;O=qZR*6 `sZ 40Qŕ:ּ0njdDŊJs^AD@ sTNYsһ/ BŎ-yȮEFLkKd'Fzc1LfUXgG<󊀐 #=@*6pl:~ͱ$\ Fyk[gp ~֥JJ 9?@sˉrsy|RczlAh : n #~w\h2 <צ_ZF\d3ޫ2򳝞sRd0PNI'FG<~t7D_LÎVE+8s15#GܢBHۻi܎>A'GbݺumHqطYP4r>d<9J3@T\dҶHpqBHeY X8$Z%pbGqi,vOoR9(T@1>ǧ=2E$^Ab;2w`oPA϶3n3~Pr*saq 1PCDǮˑ3nN(Gb 3p6<Ƕp?~ve7$` 0qԎ TyWfF+0}qzG/uŻzy>v5Uc⺹SrP\x|ێa\nSqELNԫHA꣡8`Aj\$NAG5E2FؘlwZcfgqbfc1ߨ𦌳f3Qa<pG=8\T@!z n{z9s(\: :Pp2s֦y\.cpGPS b#y5!qVC(U%wx8py皶r8$ag2x0=OqXTF - >8h6܇fϛ$ jVДB73N1EpqU{c#Wv10 q?JgHǿo@)#;vC a8<}?, Pzǵ#*ÒH$H- n`Gn?P ֵ;223F2;ȹ(ʀG~}|{Ri*:yvOo@:nyN=)eeB~c8o0Z-$:=֟99juv1N$N?"?t*hvX)=p *cI< %#?>eUABArq&f dМ}NNpiVPJCrq^t =ӊ:A=pIg9c'" Gps'ڣ)_D.A'fPF:FOjAwsm]TE|4]L-v7U?7Ua6nV>@Fc)ޑK 3AzqAxpzy<X %I98~U$/#95,3 |Ǹ&_GaC@O08?>c~`9n1Z" yԓ o뎽E p[8jó(#}mHh98<,I'\n9M DŽʐA~kW:URVTz+P$*Όۯ^޿}# ֩ۼl pAJzfA<09~J0P@;qҸًE<ۆ 8*=\/) 3F?5 G$~ֈf 8ӎU[F!Q@9R>W2OL؎ F*A=cc^Njv7`aǷ֘@-ڴ`vu?k$>ŲOBqמyVżhbS͑b0 `g<A]˓=sF H6liȠ^y"+psӥaͷrs< r gu=}\@#~r dt}{H7"wc#cGr6*Tcv" vNVA՗!yIQpySX'%^zzAgP śv2y(\'*1Edgߘq#ӭZ 6@Ͽ= R˴ | n^g> Pn3xZ`ZYA_(.2244p ?75HX zx F#' ̣$uoQsŀ@ T!J l>MMlF܁=HyZ Svܩ99U-eژU;=8Wݷ>P{r@ҰTN@ap=9@I `sڮJ8 9U؂y$ gMMFT=F~8ٗ$|x \$lw#lT.!OJ9FWZ33R,xSkp0;sڠ&ҭNr5 7xn}*&+`2zЏhu|RsS?0>T:׷0 zz{z8|ǩ1ץ$R#iLp*9 ?H͝`?D_q׽=18{Ept\eտnS'WVP c#+fWHjZY0bHŎ=?>5 ?҈B>N?Cl%nҰ5h *OA&`n޾_w1xOi[0p[fO[<+2# /m>^qZ<1T&GWxiæ8Cr=94ҟ&gcӜ@\&zof0I= N1֦ ;=NYf1`On߀ZQPwA<zHG#Ozc*!INN֪Kr!!DjFT) Fu{pHC22ILFy8 x=V6\,ӧ䁜{0 x?H[7*ib>q"! S'*'ia֣ 1oF=:c8D A3׃Ϩ>B~OPld y9W߱>/}~ڐ^-M|?&vR:?|Chxgh@?s^^qG/ y}fI!E*s]φخY ]2&a=qTiƒg\Q»`\F&ЕYu>jikRn.Vկ秭sGt!cx^fLqU>uJE zTa3RXG47@@29w#`y,ާv:)E,$`۞jLxW$zzpaM4Bh~0ZB ^D. MM7˰g"- o#h`XnFӑOilFU~b Xm`@wI:}zq,#gv9 qjZvʑdn =k5W4e8DJ&Gy77ÏʲqDʯ:>J c 9#3^tBp+k#u%E]6}? Җd1,rvTr,r<`׎i†pr1>*6b*C 0hG1BET'jgi`N mXڬC(;}s83y9yԩ U'?JsGd.8Xq}_eO.ހ'X 0*99g[ޭ7^zzER9^yXӁ Ex|88;+E&=r>޹}J6?)9$/|gI__'~e,mV˂FOUd,vcH'cêH $}z5-H贲m2 px#=[ 0\G?qYZ\#;O'{qVʐl c=T"LG=zޢAoA@+9'9)e*88#9wHJ!F;s1d#nv9'w=M" Uw&NvׯJd)F SYC=3s֤ GoSW(Wf,OF8OlTLb]Ys*Ԫ>eF28't8AqPэw #fI휏?ưXD#i.>~:]MœJSF3V*H#bH'ғEew'hnI#~%ۮ+"{Ҭ[cvs0:|@k 9V۴AO=iYt~4l!g:𧢃!߂rH3^x#&LtVcc+c׶kI.V;S3Bv:OX(r2U6 >5Q(zNpy5+Idu+8?GEշ$܍ 8.άA1«1w#=#c Ԝ4 0 bORKJ-L}kHY bA<}z5JB0H3fE@ی5pIf;Lsܚp#xh`N9fY n鷷j 'ϨxR+ nFs,JIzg?v9tSv  & RrܒOLo\s yOj ?l"/x'# IZ>{ch Dv'f03NysL]`|3x1㏽*<}ppA=}OrMI̲('u#$9<=P /یzY[ˉyCVX nu9Rl+t ǥKnV8(nsQF2O<$Wl}I

)Tlds}Hۻuppx;F8?Q1ayP3]Pwǡ"b<ߑ1 4>qpQW+@,q7t1؎?c@y|==#8u#!v}pA('a=ii\Cd۷#8L;dn^,QYÀF: gҹ]F(ᙌ`z`q׏`Q7N{Q% beq+q냑Q++eqӦ~&@O<[T$ϯ^,ysy+ xkP'R9PhޤIO~G_Zp. NO8-=jQ +f/ 9;z/$ BKc5ǘR(.V2?(,洺S8|}JIh++X? 6Lck@0G``ʏs4t\LTk1B8ִP9y% z$_hq-qbդiKkuxzl_%?,iYz2PQ~RX)1S4X289 @䜏zvDy =8Zoz}cx-dg烞Zo" qw('<qyV톞yb㫌;XEZ s]+i+-KG)0.p}jXpFۀzұjd0CnR})&fUd8*@Čqӥ[hE a:PDF9;~7McN}?ҎQpA۷a`zgzɖ_$[Y;FpG^OK#GP{U+/ڻrF1C$ojц3(0P 8=2i~@Ucp֯*PeYI89#[6)rF8>?7; BG8<OqL.WovNqTc_$XvR+d'<ۜ3׵y7*%2[`uHʈ! #=1ךŅry1\6ƕ9>zULzyeX$swQkqgy3z֞L8عR_֠| 6 }VΑWBr`=֨ $(;ڻNy' 3N:gE Glr{8?HP<= cl C_PH9Ioe_W79Ğ}+˲\1ppGQ!ل˄npp1\mFc8#=I|]XF \}pGr`eޔ4 N8vmiܬ |]+p}ݸ8Ƕ{\Vfk"@w3XI ネc8]\1˨Np:S6H<`qv=kA>QЁ@$P $1sZQ[7RL19})^*U@^8ϡ#DLxSkDm鑒ՄpHR$};nYK&}ߔey8n:S~]l`%Fqqo jeP ۓm9ߧ=U%B*ns9#+2MV98 Z0 #'w}qZqFw LqF0(a$c38v ¯$u(܆;|Q@**0@$zdz4}1gy1Wx;OnLxIR+g+?#`]=h2n@3&p|A'~Nq>`zV%:c֝h00y9u͹N3mncOxG5o"2>#*2 `h yﲂ(xF@|m;֤yÒ3s~4a9/bMW<+<ǥR݋X zEr'oN(M- ^(erN11YbQ5P1{}\*. 篾?@QϽ j@~`{:4I$a#3YFs!P#je )Fy#Ӿyj$ u8W0 ,su'$|@6xBi nPC| Z|aP^1Pլ-ct"{r3ԁ|TlH<;Yrx$z:H~Q1Iq\d OZPs¶Ӏ1(,; s4NQc:А0ܛ8R9RENZX+O֫ڽ?T):<6}%f1Nz3($68LA=} tQvq `0z瞣=T۷cvJ̪H=O֘0aГ\PYHS%} HpL񓃞7H <"NO#tXU=zyLUIH3HFlqRap z U^7u<;*-rO7^FNq)&]t` 1cOžl8SP/q,x<_LdEI P 60ׂOz3Xڌ{4j:sϡąWz^hˁ|cN-ǫ]SN ۜpxEaOnR\/ngsڬ\2͝\uQn#3'Jd@nggTF 0 xێ0b18w׊#ansϯ(8O|Z_~=#B|qJ %Ò2A<ܜ9=G4PO'(p@!}1= nNLr䁐Aq&nL-_E(]CI WrH$)3i4q T! CR;d+/$?jr pO8@ Y gIOqQ,!$YNAxݪԫa zqUCN2p9#i5r~~̿Ɵ 4HɛQk:y;g}jKy ֿcoK]xMYO4<$`d}TWp[s_}fy}$Onʄm"׷i <~Fԓ{|\QGN s.|@V/o,mww^_IӦ_RzjD)Eκ|y/Ol?{ia)広6CRJ'E%\]G*~5:"zSSsVhRFa\r~\ ɜ%ޤ9 H`OZŒtfiZy 'z{YEffR8ޡ2 $, xW"c5kE9II;#zԊ[›bFr=4r; gǷB90@RHsOʙI #?w9 c<]eWRp$φzU#g^ 31cqӽV|O͌㜌1ڐg^06 8b1X9=:~=kvߵ{ sz 1s8z 3 2(rj7+`OYĘP H:d|8<ހ:8E:p1gnp'oN}9g!ǰp$MAKgsC֠C 1uӌVdpW=p7ghzGNJ単|^vO{;rc'5䳁ԅ޵?`c /}z`| # 9#8=X Λ6X㌌): Δcnx~_^{N9ݞۧj>RJBs}( k%mQ0FFrp9$ju  >%x#NAi@s~#Y $/Չ?w?Yd8=8?ʵ.K!Oq=+6e v$~nA =֫\y2;s ۊXq.=q?<#Ӂ(UAyϡ95 mѐBciO2~MHcW!*s;ғϦ}*cBv9'Ҙ鳃 gcU\9┸TGBO^Td (=sucW'i0Hgr8$v 'zJ>3CQJ'>`A+P~nGzk`|$~eIS܏zyc2 gOoSHX~lpq?՘#*AdR 80A?֘pGP1V6wd;;$l26<~5-yNYq?|xןZ.nvqҹig^sݾE'8lb~aOljlY w;u'=E(ĂF2Xt$zP62np1I8\p0 >Y9brsoʗ9mʤ~PsGms Ԏ,%⁤Fq\a3Y1$pprx$1젞ĞvNq:th/zR`MуuǸjOlGʿ >kCþ?u I&ӏS ~Z~lGr$;6}6CVG[Jvq)qOOzn{T ;䞽^%fmL׎xF- %H+u)6!;׉7״kmI.N2WOS-t: x@qQ_of[n1>{օ"Xqӽamjc N3o-g$d[Lַk3+fgz:ϴ: #? Nd72qޮrTpqve[<`zw_0b!v=u[9vaj[(_=Gz il*f 4FG;鞙xTdPhd޻sRDn݀LV~6:28=rQK9?EdBN{~Q6ZHcp$Ji PHO8dFMy׋E<6`l= #ϥz *BtT|6ksDy@9R%R^I+׼!gipcuL*_B=5 Ηm XYW^B )X"ڌWT4ʻqr8ԓ]&-#>%=cAުD >T҂cؾw}J97;ps3LqᜁW=ڥ!ng`qRx6.q:x׭lYէQ=Ҩ\2@$v c=]bÁ`u$瞂n|'<~l8d1Ÿ|=9^DtQ(8= $DL7@WшcӮx&4qH6^K{(V?tI#SZ:/Nr޸皧dURvsY(`1;*JCr ۚ܇ikN'TɂW$Ll(#ELl .on@= PEXzF?h&@P|)_'S/B8ާ$oB&l rG˟ށܲ H9'v>0PI/8͌}xw|xrF1; q`29n*0Y_#+`OJ ̭[ '[)077>m\F>QFsX*NFNZ`1;I2A<h(Y38gz7YF=O= im.3Ɗ{n1>(q]ĠaWǶ2?ɔ =^QL&Žc":*{VM"KTAjBF^ܧ{zfw/,IO H 1O_zo//\t OP7;="ReqwGl{gޮ!a `{ީ[wg޴d|FU!x zSSg:5w8`@<O9ڢg8?0'׸xǥ f xNO&ecAx`җq;mǐX`o4w_JLձjdlcY8 ^+T6vzL{zUY\Pdܒx@=:uV`9$4鴕*ArA'8sRn@ pxEErNz +.7=r??Δr~1ʬ 8nXcPȸ ^5C4l8>Nh%C=b;j{F3pJ~vnO s玴(>U*QNz~d6Iwz?Y@N#zwLAe'Nzvv\cҤ'9aS .֝B\vB* 6ݩ\Xw\`dFTc?_)-iTǷrzqȮ:}sq\G93Qi0I#88=km@$gVV30䑜q{VҤ!PH<=:ՈN*7O9V` 2zgNHc$sǠjP@=qtPd6H<\:ԡ9d6N9#QNx?is0\O=:<}j,&V{ =sJx$`\6A =s߁MX>SзRE ۆpI>L d;g\zvgui^HSLfwe{ a-吀9R@r=sx! NqOΫ)EJ2`znkX t̏Â[e$ H8%a mo1sgnz!n`у;WA!`;? u;K0zc<~UBq=MßO, r:0Q@{S۲`7cjlju0_,p q.\pOl?y3_񾙥;l`zU\4=VzG_%X_*cc֢t T #{|5ɦ"Efғ{3Ԑ*޴ܓuua#)V,P=k7hG(tƑIpvI >P}*ֹ=v5T[?cV iNsA&¾b Tc`ﻜp>r,; Asr# aO8G^wop^" =< V=xUAo81V傹 1'~Qښw' sG-*y1a;zLd0c+<_5ִбܰ (#TuՖӎ3ĩ$6'ftg|X0nSGyeKeߘ^ˣ#JJ5C0 7 $VT\q 9d%1c 0xǯjw 9{>׋le qY3[S!O=*)6);F3\t8sI רd|aqe &6ugF*/drP:R@8==A/ČReWb͟OoC׷^MČobW׿=J#Hoc IaF34B֩9v[3 AV+8קҺ)w$b%I!=Y@Ed=TFmn 23q8*FΧ8z˸x3z&p˓q] (HےOr=+R[r1j$]q2w tklgsb{7I`rGN}ues>V'Wk#jHCr g*`s w$0{,U`cy>>\RVB ހIB챧 y՝ͱF:=:~ @1ҁ܅F>c9MsН;'C78=jRNь~j^zig{mqeqӓOQȠ =j7~TsR\;M( %z=)4@0ay zFw0qҘcepvz?JUjrN=:t ˜tsPˆ϶>~u3 1a~'LGw*)lu2hIZ9>\p$7?ҚQtI'cMullu ُ'sP ש)93p۔qٿoK$zvȣ$ {> } =O*[}ўÁӶ{#A!|3ד=}2>zR6 ;uޕm$F;`׸<vgOhƒy?˿BJ 3ZMR9F9֐s$=< I'9>:zJ9m®s^^?:޽ N“{ t7nǺt5,α.8.VL9o="-W';xpj񁓟9 #d.#gԮW#US8)ev { fxd\*pJWO9<}+  $=953|q'֋'U9'F3cq :R#32TWZ"g$Ǯx?j "DB8GJ{R3,ĕP9=ǧRȬ݌ N:@*ps5!2͍8#|t*w)܀Ҭ?ez As֝RF8=3AB K ?N) ex)W'{֤g84\a 8}zҰTmFђy8}Joi8{ S!4a?0a?{ 00pϡʍ3r d䞜jq#xTXeF|8!H$:=Zw`8˟?ځ[ wyq1jҢyĜלw=15ry昦P :W|ozVa3P]%3u OZ>l." o^Q8C .ԧ&:nme9FG9#ھԚHU$9n0O9|2sY{кAFGs^RkX;d^ CǧNƾ3G>!ZzmN2׾3\mrwm^Ztˑʤc$uϿj{Ʋj0S' 9"WLQ6f N~fOJ+Ffc!z*,!8Sc#.I#?H@;TGz ƪIlz3:ߟ-y?w_[mXTNY/` g=A+/Yz1lZHo-V/_ճc^fu_εm}ƻYi+HHҺ>=+dggq> cl~R̫ncY#?7ׁ^$YO'uoU3BOECZgA r q+mDHryr3yVWC?df d:Pdz[3'`G89ϩoO4ǣO3$j|s:qyX*1qk/mBHYFSyV=!cA5r_M n:9zWc9\ˎ]}?O\~5f7|2Y 7N3ץt\HW2  ϭs~t#[?O`K =y<`~5$qC?ǚɃgkH C-ľsID-N=}&]Pp:__#jt# ѐ0[ay&L9#S|uʩ[bN𽳓j$0@NTm_ /300>^N*]d*}O Z X7}0jENqns=YMi"®Q@8~RW^ 1fۿ>0oV`=OO'`@eo,>mʡZ?3  ӷ<, 1 `/5/A4E cRٻ9?O7Y>dP;~IcfPNxIW?Fq,اy8Yryi! ?AC(;׹b Tp1˞U?\Z uf?.VNO=8OUVJ]3=j28̧  c}GYb]QN@>$y8@3L4T1?_f9C?wv?#J 2_SqQ\Eݦ'?_hU/ڝA;zcqvo+x{"EEnh9\q01uj?u_?:T*UAE/ۯ SgԭhۻߑlS!H#Jkt/bT: 5~mĞ9|zT5#VP-'֐lc=1ۂjI~_O܏4 ªR_瓏j2w''nOӃGGȿ{)i#5%yV+vZ/HZTr˹HTx qIi:_ Lm'8A8WJJG WA=+_YZmy NF7sډW8;G=q>XOG+2D_`d}y(ݻ:CM}?jU_jۺq#s?Z;I*mHV[Nsd.ZGUүoOQk*'׽x_^ACPANSA-DB-20250521.001/images/briandfoypoboxcom-gpg-key-selfie.jpeg.gpg0000644000076500000240000000150115013507350023677 0ustar brianstaff-----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEEhn1TsI5DPfQBoG70mpwP5/ZIdr8FAmK6Jr4ACgkQmpwP5/ZI dr9Sgw//bv/PWvriREjEDs9ZXL6V7i8nWKkLRGFn430woPLqqrKvaWCWSsDX+zP0 R5FToIUyybZY3ro8Abw3FsjDyBV7Ifc8T00s7Ko4AYA1wH6HyIjkaiiwsWbpHhGf U+Usi9MEu5syk3cvodtbPWr+SuC2FvYoffxG1pPhVqgnL0yJabZXVixxBw86h/SR g4ztHwHSzgVH6xHNciN1eyAFtnzyf7SyVPIxIqkwIHqORNww9CZOT9WxGEsEBNAY q5CLqD8mp0hP5Sq0hvpy+ZMOCZ5zg3HbfTSEyWqT/UDVjuD2tYHKsLWZSXrYaKHY OCngj3KIM7VWbE3ox2+h54NLrzUOT+eTGJcUpb4A+w9h90VSk8KIsOgtqy7XQeAS JDLrG7w7sDsCELJzzZ5l+rfgOuuOq2PHT6nCZmPHu29Gdy8r5LMdb8/ATWn1AkWq T9nvUvTKhJ5+yZrCAvNuYUYJrEs+QivvVLNf+ZWiYw40v1ahOMdgNiF66vN6ioAY yQTsd2t7aiwfzgbAZv1LBLYtAUl0/p67C09hHITEs8oooqT5PKlnXq8IJZlNoPyf IAbEHxY3Hzbmist6wvbA9UVn4tqFfy4y6vTH/NONWSxUYdcUQtdVbjlo/TuHFu8q e/vZajPtDVNRLqh6phGC7V6f3qCwfkg9A/P//nPtmNNh/ZBAX6g= =XQ9B -----END PGP SIGNATURE----- CPANSA-DB-20250521.001/images/bdfoycpanorg-gpg-key-selfie.jpeg.gpg0000644000076500000240000000150115013507350022630 0ustar brianstaff-----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEEdaq0LLoNfzfw1oht+D+NXoeLYEEFAmK6JtsACgkQ+D+NXoeL YEEl8w/9EPo1UEPYB7cHhxAnAx9tP8Efui+6ZavTyx74fKXc3cT9xBwD92K5zKaJ kenTzqvYFLSANN/unNZ7tzS0BxR3fTI5S85fP13qSuM6FwEpw/eeF4nfh0Fp1KvM sZ1ht4vVgwjPWuPz2r3MuxhLeA2btIKWe0VGjgRoFtmAvakJHL1hK3P+8OqIcLKM s6/Sq8mDM2vj817okNpm2lmUOgia8Q90KDTHwCeSdSbVQgnz5f7M9UiyXTSvd7EE LxRhnoPbixZL9PyvXKdBu2E/jdv0fV8CtsUXhOlyxgtHb8PnNhrrwW1zC78dbf7G +Oz2PMfJtTXgc6sv25PFHN/Smk2hxDYTFYQ5JsAg3rMYBVCV7pc7C3f/wBQVdxti c1I62Be+1ZuPMFtPe8VqDaFEwuVFVGiXzxJJAMPgOYIEcSiHtMdywpNzRpgOJ34a JG+tILREi9C8zV621LgyfsaywiPA97x17/deEQZbjWvjat4xfhB29XJRQIA6dREg BIUVwINV2TAPTFTp4WS05zsIRz+tl+ySKeq/vUdwpxAeKRp8SpNIT+bDleSfHb7n DEdXMtjhRiT8cLVTuMK2uJ4jOJER+7+JNt1WMqlXuJu/eBAnnNMtq9BGeYzNHCK9 9QGmmIqcV1mfhnpkF/V1WjITTp/eyZJfPWAk6D1zsYrfLsCuJg8= =0pLH -----END PGP SIGNATURE----- CPANSA-DB-20250521.001/Changes0000644000076500000240000000670615013507350013764 0ustar brianstaff# Changes for CPANSA::DB 20250521.001 2025-05-22T02:41:43Z * data update to fix latest YAML::LibYAML report (#200) 20250520.001 2025-05-20T15:30:43Z * data update for 2025-05-20 20250518.002 2025-05-18T20:23:11Z * data update for 2025-05-18 20250513.001 2025-05-13T15:23:15Z * data update for 2025-05-13 * new report for Plack-Middleware-Statsd 20250512.001 2025-05-13T01:14:07Z * fix smart-quote that was causing CPAN::Audit tests to fail with wide-character warnings * data update for 2025-05-12 20250506.001 2025-05-06T12:23:42Z * data update for 2025-05-06 20250505.001 2025-05-05T23:52:41Z * data update for 2025-05-05 20250504.001 2025-05-04T20:05:28Z * data update for 2025-05-04 (may the 4th be with you) 20250414.001 2025-04-14T14:26:08Z * data update for 2024-04-14 20250413.002 2025-04-13T19:32:15Z * data update for 2025-04-13 20250407.003 2025-04-07T15:58:44Z * replace earlier release that had testing problem (#194) 20250407.002 2025-04-07T08:47:37Z * data update for 2025-04-07 20250403.001 2025-04-04T12:24:22Z * update for 2025-04-03 20250304.001 2025-03-04T15:02:27Z * data update for 2025-03-04 * version data for modules now includes versions that only show up in perl core (dual-lived versions not on CPAN) (GitHub #190) 20250206.001 2025-02-06T05:41:55Z * data update 20250125.001 2025-01-25T16:16:57Z * data update for 2025-01-05 * Crypt::Primes 0.52 fixes its report (#189) 20250109.001 2025-01-10T04:38:37Z * data update for 2025-01-09 20250104.001 2025-01-04T17:10:28Z * data update * CVE-2025-22376 for Net::OAuth 20250103.002 2025-01-03T12:56:48Z * data update for DBD::SQLite for CVE-2006-6153 20250103.001 2025-01-03T06:30:10Z * data update 20250102.001 2025-01-02T19:54:21Z * data update * CVEs assigned for Net::EasyTCP 20241231.001 2024-12-31T16:40:38Z * data update for 2024-12-31 * CVE-2006-0053 for Imager * CVE-2020-36827 for XAO::Web 20241229.001 2024-12-30T23:31:49Z * data update * Adds reports for Crypt::Prime, Crypt::Random, and EasyTCP 20241227.001 2024-12-28T03:47:58Z * data update * new report for Crypt::Random::Source (#179) 20241218.005 2024-12-19T01:22:10Z * Add report for App::Genpass (#178) * regenerate data 20241208.003 2024-12-08T21:47:48Z * data update for 2024-12-08 20241203.001 2024-12-04T02:20:11Z * data update for 2024-12-03 20241126.001 2024-11-26T23:05:31Z * data update * the stuff using Data::Rx moves to xt/, which is not distributed (#172) 20241125.001 2024-11-25T20:15:46Z * data update 20241122.009 2024-11-22T14:33:57Z * fix the GPG signatures 20241122.003 2024-11-22T12:34:01Z * fix meta data, that had done stupid date things 20241121.002 2024-11-21T21:18:26Z * data update for 2024-11-21 * includes CVE-2024-10224 for Module::ScanDeps (#170) * Pod broken out to separate files since MetaCPAN doesn't like large files 20241118.002 2024-11-18T16:01:32Z * Remove Mojo::Util as a pre-requisite (#168) 20241118.001 2024-11-18T15:48:04Z * Regenerate dist to fix some metadata issues (#169) 20241117.003 2024-11-17T21:06:07Z * test release 20241117.002 2024-11-17T21:01:42Z * test release 20241117.001 2024-11-17T20:14:34Z * initial release. This breaks out the data portion of CPAN::Audit into a separate dist that can be updated independently. This maintains the CPAN::Audit::DB module (for now), creates a new module CPANSA::DB to replace it evenutally, and also distributes a JSON version of the database for people who want to use it without CPAN::Audit. CPANSA-DB-20250521.001/cpan-security-advisory.json0000644000076500000240000516142615013507350020016 0ustar brianstaff{"module2dist":{"Image::Info::PPM":"Image-Info","Valiant::Error":"Valiant","Pinto::Schema::Result::RegistrationChange":"Pinto","Jifty::Plugin::AdminUI::View":"Jifty","Valiant::Filter::Trim":"Valiant","Data::Entropy::RawSource::RandomnumbersInfo":"Data-Entropy","DBD::Proxy":"DBI","Elive::Entity::Session":"Elive","Tk::PNG":"Tk","YAML::Type::code":"YAML","XS::APItest":"perl","Mite::Role":"Mite","XAO::DO::Web::IdentifyUser":"XAO-Web","Spoon::DataObject":"Spoon","Dpkg::Vendor::Devuan":"Dpkg","MHonArc::UTF8::CP1250":"MHonArc","Valiant::JSON::JSONBuilder":"Valiant","Jifty::Plugin::ClassLoader":"Jifty","DBD::NullP::st":"DBI","Dancer2::Serializer::YAML":"Dancer2","Plack::App::PSGIBin":"Plack","Crypt::Perl::X509::Extension::policyConstraints":"Crypt-Perl","Crypt::Perl::X509::Extension::nameConstraints":"Crypt-Perl","Image::Info::WEBP":"Image-Info","Jifty":"Jifty","Plack::App::XAO":"XAO-Web","MHonArc::UTF8::Encode":"MHonArc","Imager::Font::Wrap":"Imager","Dancer::Serializer::Mutable":"Dancer","of":"perl","Tk::MakeDepend":"Tk","XAO::DO::Web::CgiParam":"XAO-Web","Plack::LWPish":"Plack","HTTP::Body::XForms":"HTTP-Body","ModPerl::Interpreter":"mod_perl","File::Spec::Unix":"PathTools","Jifty::Web::Form::Field::Password":"Jifty","Jifty::Script::Script":"Jifty","Jifty::Plugin::Config::Dispatcher":"Jifty","Lemonldap::NG::Portal::Auth::WebAuthn":"Lemonldap-NG-Portal","SOAP::Lite::Packager::MIME":"SOAP-Lite","Crypt::Perl::RSA::KeyBase":"Crypt-Perl","Galileo::File":"Galileo","MHonArc::CharEnt::ISO8859_7":"MHonArc","XML::Twig::XPath::Namespace":"XML-Twig","Dancer::Continuation::Route::FileSent":"Dancer","Legacy::Graphics::Browser::Util":"GBrowse","Apache::ASP":"Apache-ASP","Bio::Graphics::Browser2::CachedTrack":"GBrowse","Kelp::Module::JSON":"Kelp","Mojo::Exception":"Mojolicious","Net::SSLeay":"Net-SSLeay","Crypt::Perl::ECDSA::KeyBase":"Crypt-Perl","Tk::X11Font":"Tk","Compress::Raw::Zlib":"Compress-Raw-Zlib","RT::Authen::ExternalAuth::LDAP":"RT-Authen-ExternalAuth","CGI::Session::Query":"CGI-Session","Config::Model::Warper":"Config-Model","UNIVERSAL":"perl","Spreadsheet::ParseXLSX::Decryptor":"Spreadsheet-ParseXLSX","Imager::Font::FreeType2":"Imager","Spreadsheet::ParseExcel::FmtJapan":"Spreadsheet-ParseExcel","Dancer2::Session::YAML":"Dancer2","Apache::ASP::Response":"Apache-ASP","Crypt::Perl::JWK":"Crypt-Perl","ModPerl::RegistryBB":"mod_perl","Lemonldap::NG::Portal::Plugins::GrantSession":"Lemonldap-NG-Portal","CPAN::Exception::RecursiveDependency":"CPAN","Plack::Server::Standalone":"Plack","Catalyst::ActionRole::ConsumesContent":"Catalyst-Runtime","Pod::Perldoc::ToMan":"Pod-Perldoc","DBM_Filter::utf8":"perl","LWP::Protocol::loopback":"libwww-perl","App::Pinto::Command::reset":"Pinto","OS2::REXX::_ARRAY":"perl","Image::ExifTool::Olympus":"Image-ExifTool","Mail::Mailer::sendmail":"MailTools","Bio::Graphics::Browser2::DataLoader::sam":"GBrowse","PApp":"PApp","Jifty::Plugin::IEFixes":"Jifty","Jifty::View::Mason::Halo":"Jifty","Bio::Graphics::Browser2::ExternalData":"GBrowse","Dancer::Logger::Capture::Trap":"Dancer","Jifty::Plugin::SinglePage::Dispatcher":"Jifty","Dancer2::Logger::Console":"Dancer2","UI::Dialog::Backend::NotifySend":"UI-Dialog","Jifty::View::Declare::BaseClass":"Jifty","Tk::Adjuster::Item":"Tk","GD":"GD","Lemonldap::NG::Portal::2F::Register::Base":"Lemonldap-NG-Portal","CGI::Session":"CGI-Session","Imager::File::CUR":"Imager","Plack::Loader::Restarter":"Plack","Moxy::Plugin::RefererCutter":"Moxy","Apache::Wyrd::Request":"Apache-Wyrd","Apache::Wyrd::Debug":"Apache-Wyrd","Jifty::TestServer::Apache":"Jifty","SOAP::Transport::IO::Server":"SOAP-Lite","Crypt::Mode::CTR":"CryptX","Jifty::Plugin::ViewDeclarePage::Page":"Jifty","Bundle::LWP":"libwww-perl","FindExt":"perl","Image::Info::XPM":"Image-Info","PApp::UserObs":"PApp","Crypt::OpenSSL::DSA":"Crypt-OpenSSL-DSA","Pinto::Role::Installer":"Pinto","App::cpanminus":"App-cpanminus","CGI::Cookie":"CGI","Image::ExifTool::PICT":"Image-ExifTool","APR::Error":"mod_perl","PerlIO":"perl","Jifty::CAS::Store":"Jifty","HTTP::Daemon":"HTTP-Daemon","Perlbal::Plugin::Queues":"Perlbal","Lemonldap::NG::Portal::Captcha::ReCaptcha":"Lemonldap-NG-Portal","Net::DNS::RR::SMIMEA":"Net-DNS","Net::DNS::Resolver::Recurse":"Net-DNS","LWP::Protocol::ftp":"libwww-perl","Net::Server::Thread":"Net-Server","Sub::HandlesVia::Handler":"Sub-HandlesVia","Dancer::Config::Object":"Dancer","MHonArc::UTF8::CP866":"MHonArc","Perlbal::Fields":"Perlbal","Jifty::Response":"Jifty","Sub::HandlesVia::Handler::Traditional":"Sub-HandlesVia","Catalyst::Component::ContextClosure":"Catalyst-Runtime","Catalyst::Stats":"Catalyst-Runtime","IO::Socket::SSL::Session_Cache":"IO-Socket-SSL","Pinto::Role::Committable":"Pinto","Pinto::Server::Responder":"Pinto","Perl::Version":"Perl-Version","Text::Wikispaces2Markdown":"MojoMojo","Lemonldap::NG::Portal::Auth::GitHub":"Lemonldap-NG-Portal","Tk::Frame":"Tk","Zonemaster::Backend::Error::Internal":"Zonemaster-Backend","Crypt::Mac::PMAC":"CryptX","CGI::Session::Serialize::json":"CGI-Session","DBI::DBD::SqlEngine::TieMeta":"DBI","XAO::DO::Web::URL":"XAO-Web","Tk::Label":"Tk","XML::Twig::Notation":"XML-Twig","Thread::Signal":"perl","Image::ExifTool::RIFF":"Image-ExifTool","OS2::Process":"perl","Pod::Perldoc::GetOptsOO":"Pod-Perldoc","Jifty::CAS::Store::LocalFile":"Jifty","CGI::Session::DB_File":"CGI-Session","Crypt::Perl::X509::Extension::policyMappings":"Crypt-Perl","Tie::StdHash":"perl","Apache::MP3::L10N":"Apache-MP3","Apache::fork":"mod_perl","Dancer::Logger::Capture":"Dancer","Linux::Statm::Tiny":"Linux-Statm-Tiny","DBD::SQLite::VirtualTable::FileContent::Cursor":"DBD-SQLite","Plack::Middleware::XFramework":"Plack","Apache::MP3::L10N::hr":"Apache-MP3","Lemonldap::NG::Portal::2F::Password":"Lemonldap-NG-Portal","GPIB::hpserial":"GPIB","Lemonldap::NG::Portal::UserDB::WebID":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Main::Plugins":"Lemonldap-NG-Portal","Valiant::Util::Exception::MissingCountKey":"Valiant","ModPerl::InterpPool":"mod_perl","Crypt::Perl::ECDSA::PublicKey":"Crypt-Perl","Mite::Attribute::SHV::CodeGen":"Mite","App::Exceptions":"App-Context","Config::Model::Role::WarpMaster":"Config-Model","MojoMojo::Formatter::GoogleCalendar":"MojoMojo","Mozilla::CA":"Mozilla-CA","Module::Provision::TraitFor::VCS":"Module-Provision","Dpkg::BuildDriver":"Dpkg","DBD::mysql::dr":"DBD-mysql","Lemonldap::NG::Portal":"Lemonldap-NG-Portal","Valiant::HTML::Util::TagBuilder::_tags":"Valiant","Locale::Maketext::GutsLoader":"Locale-Maketext","Imager::FORMATS":"Imager","Valiant::Util::Exception::NameNotFilter":"Valiant","Net::OAuth::ProtectedResourceRequest":"Net-OAuth","Module::Provision::TraitFor::Badges":"Module-Provision","Pinto::IndexReader":"Pinto","Catalyst::Authentication::Store::LDAP":"Catalyst-Authentication-Store-LDAP","Spoon::Installer":"Spoon","Crypt::Perl::RSA::Generate":"Crypt-Perl","Tk::ColorDialog":"Tk","SOAP::MIMEParser":"SOAP-Lite","Jifty::RightsFrom":"Jifty","HTTP::Session2::Random":"HTTP-Session2","Jifty::Plugin::Config::View":"Jifty","Image::ExifTool::CanonCustom":"Image-ExifTool","File::DataClass":"File-DataClass","Archive::Zip::MemberRead":"Archive-Zip","Tk::LabRadiobutton":"Tk","Net::OpenID::Consumer":"Net-OpenID-Consumer","Jifty::Plugin::Authentication::Password::Notification::ConfirmLostPassword":"Jifty","Perlbal::ClientHTTP":"Perlbal","Plack::Server::Apache1":"Plack","File::DataClass::Constants":"File-DataClass","Mojo::Content::Single":"Mojolicious","Image::ExifTool::AAC":"Image-ExifTool","HTML::Scrubber":"HTML-Scrubber","CGI::MultipartBuffer":"CGI","Apache::File":"mod_perl","Mail::Field::Date":"MailTools","Spreadsheet::ParseExcel":"Spreadsheet-ParseExcel","APR::Socket":"mod_perl","Crypt::KeyWrap":"Crypt-JWT","Crypt::PK":"CryptX","APR":"mod_perl","IPC::Run::Win32Process":"IPC-Run","SOAP::Transport::TCP::Client":"SOAP-Lite","Dpkg::Shlibs::Cppfilt":"Dpkg","Apache::MP3::L10N::zh_cn":"Apache-MP3","XML::LibXML::Schema":"XML-LibXML","Bio::Graphics::Browser2::DataLoader::featurefile":"GBrowse","LWP::RobotUA":"libwww-perl","MojoMojo::Schema::Result::PathPermissions":"MojoMojo","CPAN::FTP::netrc":"CPAN","Crypt::Perl::X::ECDSA::NoCurveForOID":"Crypt-Perl","testcases::requires":"XAO-Web","Net::LDAP::Control::Relax":"perl-ldap","APR::ThreadRWLock":"mod_perl","MHonArc::UTF8::VISCII":"MHonArc","strict":"perl","Crypt::AuthEnc":"CryptX","Jifty::Plugin::ActorMetadata":"Jifty","Net::DNS::DomainName2535":"Net-DNS","Image::ExifTool::HTML":"Image-ExifTool","Image::ExifTool::MPEG":"Image-ExifTool","Spreadsheet::ParseXLSX::Worksheet":"Spreadsheet-ParseXLSX","HTML::Perlinfo::Loaded":"HTML-Perlinfo","Net::Server::Log::Sys::Syslog":"Net-Server","UI::Dialog::Backend::Whiptail":"UI-Dialog","Jifty::Plugin::Authentication::Password::Action::ResetLostPassword":"Jifty","APR::ThreadMutex":"mod_perl","Apache::Session::Browseable::Store::SQLite":"Apache-Session-Browseable","Pinto::Globals":"Pinto","Tie::StdScalar":"perl","Image::ExifTool::FLIF":"Image-ExifTool","MojoMojo::View::Email":"MojoMojo","CatalystX::Controller::OpenSearch":"Search-OpenSearch-Server","Plack::Middleware::Head":"Plack","Plack::Middleware::ConditionalGET":"Plack","Catalyst::Request::REST::ForBrowsers":"Catalyst-Action-REST","Moxy::Plugin::DisplayWidth":"Moxy","HTML::EP::Examples::Admin":"HTML-EP","RPC::PlClient":"PlRPC","Encode::CN":"Encode","Valiant::Filter::Numberize":"Valiant","PApp::ECMAScript::Layer":"PApp","Apache2::Process":"mod_perl","Dancer::Cookies":"Dancer","DBI::Gofer::Serializer::DataDumper":"DBI","MojoMojo::Formatter::SyntaxHighlight":"MojoMojo","RPC::XML::nil":"RPC-XML","Batch::Batchrun::Extract":"Batch-Batchrun","Crypt::Perl::Ed25519::KeyBase":"Crypt-Perl","Bio::Graphics::Browser2::Plugin::AuthPlugin":"GBrowse","MHonArc::UTF8::ISO8859_11":"MHonArc","Jifty::Web::Form::Field::Button":"Jifty","Jifty::Continuation":"Jifty","Bio::DB::Tagger::mysql":"GBrowse","APR::OS":"mod_perl","Lemonldap::NG::Portal::2F::Register::Password":"Lemonldap-NG-Portal","Jifty::Plugin::Authentication::Password::Mixin::Model::User":"Jifty","Zonemaster::Backend::Config::DCPlugin":"Zonemaster-Backend","My::SessionIterator":"SOAP-Lite","MHonArc::UTF8::ISO8859_4":"MHonArc","Bio::Graphics::Browser2::UserTracks":"GBrowse","Crypt::Perl::X509::InfoAccessBase":"Crypt-Perl","mod_perl2":"mod_perl","Image::ExifTool::CBOR":"Image-ExifTool","RPC::XML::datatype":"RPC-XML","PApp::Callback":"PApp","Dancer2::Logger::Capture::Trap":"Dancer2","Cpanel::JSON::XS":"Cpanel-JSON-XS","Crypt::Digest::BLAKE2b_256":"CryptX","yaml_scalar":"YAML","Bio::Graphics::Browser2::SubtrackTable":"GBrowse","Apache::Wyrd::Interfaces::Columnize":"Apache-Wyrd","XAO::DO::Web::TextTable":"XAO-Web","Net::Server::SIG":"Net-Server","DBD::ExampleP::st":"DBI","Bio::Graphics::Browser2::Markup":"GBrowse","Tk::DragDrop::Local":"Tk","Pinto::Schema":"Pinto","Lemonldap::NG::Portal::2F::Yubikey":"Lemonldap-NG-Portal","DBD::mysqlPP::db":"DBD-mysqlPP","Bio::DB::GFF::Aggregator::wormbase_gene":"GBrowse","Amon2::Auth::Site::LINE":"Amon2-Auth-Site-LINE","Bio::Graphics::Browser2::TrackDumper::RichSeqMaker":"GBrowse","Jifty::Test::Email":"Jifty","Valiant::HTML::Util::Form::FormObject":"Valiant","Apache::EP":"HTML-EP","Jifty::Plugin::SetupWizard::View":"Jifty","Plack::Server":"Plack","MHonArc::CharEnt::CP1254":"MHonArc","Apache::Wyrd::Site::MySQLIndexBot":"Apache-Wyrd","Bio::Graphics::Browser2::Render::Slave::AWS_Balancer":"GBrowse","Crypt::Perl":"Crypt-Perl","Tk::TextUndo":"Tk","Spreadsheet::ParseExcel::Utility":"Spreadsheet-ParseExcel","Apache::Wyrd::Lookup":"Apache-Wyrd","Elive::Entity::ServerParameters":"Elive","Imager::Filter::Mandelbrot":"Imager","Apache::ePerl":"eperl","Apache::ASP::STDERR":"Apache-ASP","Maintainers":"perl","Valiant::HTML::Util::Pager":"Valiant","Apache::MP3::L10N::it":"Apache-MP3","MojoMojo::Formatter::Emote":"MojoMojo","CGI::Session::Test::SimpleObjectClass":"CGI-Session","File::Spec":"PathTools","Net::OAuth::Client":"Net-OAuth","YAML::Loader::Base":"YAML","Dpkg::Control":"Dpkg","Net::DNS::RR::LOC":"Net-DNS","File::Spec::Mac":"PathTools","RPC::XML::Parser":"RPC-XML","Spoon::ContentObject":"Spoon","Net::IPv4Addr":"Net-IPv4Addr","App::Pinto::Command::thanks":"Pinto","Lemonldap::NG::Portal::Auth::DBI":"Lemonldap-NG-Portal","Apache::Wyrd::CGISetter":"Apache-Wyrd","Catalyst::TraitFor::Request::REST":"Catalyst-Action-REST","blib":"perl","Image::ExifTool::WTV":"Image-ExifTool","DBD::Gofer":"DBI","SOAP::Lite::Deserializer::XMLSchema1999":"SOAP-Lite","Valiant::HTML::FormBuilder::Checkbox":"Valiant","Crypt::Stream::Salsa20":"CryptX","Jifty::Client":"Jifty","Net::LDAP::Message":"perl-ldap","MIME::Parser::FileUnder":"MIME-tools","Crypt::PK::X25519":"CryptX","Mojolicious::Sessions":"Mojolicious","Crypt::Random::Provider::Win32API":"Crypt-Random","Apache::SessionX::Generate::MD5":"Apache-SessionX","Crypt::PK::Ed25519":"CryptX","Dancer2::CLI::Command::gen":"Dancer2","Crypt::PK::DH":"CryptX","Tk::Table":"Tk","Dancer2::Template::Tiny":"Dancer2","RPC::XML::struct":"RPC-XML","SOAP::Packager::DIME":"SOAP-Lite","Tk::Labelframe":"Tk","Crypt::Digest::SHA224":"CryptX","YAML::Warning":"YAML","Image::ExifTool::Qualcomm":"Image-ExifTool","Image::ExifTool::GoPro":"Image-ExifTool","Elive::Entity::InvitedGuest":"Elive","DBIx::Class::EncodedColumn::Crypt":"DBIx-Class-EncodedColumn","Crypt::Perl::ToDER":"Crypt-Perl","RPC::XML::base64":"RPC-XML","Crypt::Cipher::Khazad":"CryptX","Elive":"Elive","Moxy::Plugin":"Moxy","Valiant::Filter::Title":"Valiant","MHonArc::CharEnt::ISO8859_10":"MHonArc","APR::IpSubnet":"mod_perl","Apache::Wyrd::Lattice":"Apache-Wyrd","CGI::Application::Plugin::CAPTCHA":"CGI-Application-Plugin-CAPTCHA","Pinto::PrerequisiteWalker":"Pinto","Data::Dumper":"Data-Dumper","Data::Entropy::RawSource::RandomOrg":"Data-Entropy","Crypt::OpenSSL::RSA":"Crypt-OpenSSL-RSA","SOAP::Apache":"SOAP-Lite","POE::Component::IRC::Plugin::NickServID":"POE-Component-IRC","XML::LibXML::XPathExpression":"XML-LibXML","GD::Polygon":"GD","SOAP::Transport::HTTP::Daemon":"SOAP-Lite","Crypt::Perl::X509::Extension::authorityKeyIdentifier":"Crypt-Perl","Tk::Tiler":"Tk","MHonArc::UTF8::AppleIceland":"MHonArc","POE::Component::IRC::Plugin::BotCommand":"POE-Component-IRC","Mojo::WebSocket":"Mojolicious","XML::LibXML::Document":"XML-LibXML","HTTP::Session2::ServerStore":"HTTP-Session2","Jifty::Web::Form::Field::Date":"Jifty","Bio::Graphics::Browser2::PadAlignment":"GBrowse","Net::OAuth::UserAuthResponse":"Net-OAuth","MHonArc::CharEnt::AppleCyrillic":"MHonArc","Dezi::Server::About":"Dezi","Pod::Perldoc::ToChecker":"Pod-Perldoc","Net::OAuth::V1_0A::AccessTokenRequest":"Net-OAuth","Dpkg::Source::Package::V3::Git":"Dpkg","Elive::DAO::Array":"Elive","Catalyst::Component::ApplicationAttribute":"Catalyst-Runtime","Dancer":"Dancer","Crypt::JWT":"Crypt-JWT","MDK::Common":"MDK-Common","Bio::DB::SeqFeature::Store::BedLoader":"GBrowse","Net::Server::Proto::UNIX":"Net-Server","Lemonldap::NG::Portal::Auth::Kerberos":"Lemonldap-NG-Portal","MDK::Common::Various":"MDK-Common","DBD::DBM":"DBI","Mojo::IOLoop::Subprocess":"Mojolicious","Crypt::Perl::Ed25519::PrivateKey":"Crypt-Perl","Crypt::Digest::RIPEMD320":"CryptX","Apache::MP3::L10N::fa":"Apache-MP3","Crypt::Cipher::Anubis":"CryptX","Pinto::Action::Merge":"Pinto","Dancer2::CLI::Command::version":"Dancer2","Spreadsheet::ParseXLSX::Decryptor::Agile":"Spreadsheet-ParseXLSX","UI::Dialog::Backend":"UI-Dialog","Image::ExifTool::RSRC":"Image-ExifTool","Dancer::FileUtils":"Dancer","MHonArc::CharEnt::CP866":"MHonArc","Pinto::IndexWriter":"Pinto","Testing":"perl","IO::Uncompress::Adapter::Inflate":"IO-Compress","Apache::MP3::L10N::tr":"Apache-MP3","Pinto::Schema::Result::Revision":"Pinto","Jifty::Model::SessionCollection":"Jifty","MHonArc::CharEnt::AppleHebrew":"MHonArc","Image::ExifTool::BPG":"Image-ExifTool","Valiant::HTML::Util::Form":"Valiant","Net::DNS::RR::OPT::CLIENT_SUBNET":"Net-DNS","CPAN::Admin":"CPAN","Pinto::Chrome":"Pinto","Net::LDAP::Schema":"perl-ldap","Bio::Graphics::Browser2::Render::HTML::TrackListing":"GBrowse","MojoMojo::Schema::Result::Preference":"MojoMojo","Valiant::Filters":"Valiant","Locale::Maketext::Guts":"Locale-Maketext","Crypt::Random::Provider::egd":"Crypt-Random","LWP::Protocol::ldapi":"perl-ldap","POE::Component::IRC::Plugin::NickReclaim":"POE-Component-IRC","Tk::Bitmap":"Tk","Valiant::Proxy::Object":"Valiant","PApp::Lock":"PApp","Crypt::Digest::RIPEMD160":"CryptX","DBD::File::Statement":"DBI","IO::Uncompress::Base":"IO-Compress","Config::Model::Exception":"Config-Model","Apache::MP3::L10N::Aliases":"Apache-MP3","Encode::EBCDIC":"Encode","IPC::Open2":"perl","ExtUtils::ParseXS::Utilities":"ExtUtils-ParseXS","Lemonldap::NG::Portal::UserDB::Null":"Lemonldap-NG-Portal","Dancer2::Core::Role::DSL":"Dancer2","Image::ExifTool::FLIR":"Image-ExifTool","FCGI::Stream":"FCGI","Apache::Wyrd":"Apache-Wyrd","HTTP::Body::OctetStream":"HTTP-Body","App::MessageDispatcher":"App-Context","Crypt::Perl::X509::Extension::issuerAltName":"Crypt-Perl","PAR::Filter::PatchContent":"PAR-Packer","Imager::Preprocess":"Imager","DemoASP":"Apache-ASP","Lemonldap::NG::Portal::Issuer::Get":"Lemonldap-NG-Portal","Image::ExifTool::VCard":"Image-ExifTool","Mojo::Transaction::WebSocket":"Mojolicious","Image::ExifTool::TagLookup":"Image-ExifTool","Data::FormValidator::Constraints::RegexpCommon":"Data-FormValidator","MHonArc::UTF8::ISO8859_9":"MHonArc","Valiant::Naming":"Valiant","Lemonldap::NG::Portal::Main::Run":"Lemonldap-NG-Portal","Moxy::Request":"Moxy","Crypt::DSA::Key":"Crypt-DSA","Tie::ExtraHash":"perl","Mite::Role::Tiny":"Mite","XML::LibXML::SAX::Parser":"XML-LibXML","Image::Info::TIFF":"Image-Info","Lemonldap::NG::Portal::Lib::Remote":"Lemonldap-NG-Portal","Moxy::Plugin::Pictogram":"Moxy","Jifty::Plugin::ActorMetadata::Mixin::Model::ActorMetadata":"Jifty","Mojolicious::Command::Author::generate":"Mojolicious","MIME::Parser::Results":"MIME-tools","Mail::Mailer::smtp::pipe":"MailTools","IO::Compress::Zlib::Extra":"IO-Compress","DBI::Library::Database::db":"MySQL-Admin","DBD::DBM::db":"DBI","Apache::MP3::L10N::ar":"Apache-MP3","Encode::TW":"Encode","LWP::Protocol::Net::Curl":"LWP-Protocol-Net-Curl","Plack::Handler::Apache2::Registry":"Plack","HTML::Perlinfo::Modules":"HTML-Perlinfo","Image::ExifTool::Exif":"Image-ExifTool","Apache::Session::Browseable::Cassandra":"Apache-Session-Browseable","XML::LibXML::ErrNo":"XML-LibXML","MailTools":"MailTools","Net::LDAP::Message::Dummy":"perl-ldap","App::Pinto::Command::copy":"Pinto","Net::OAuth::Response":"Net-OAuth","Image::ExifTool::Text":"Image-ExifTool","MIME::Decoder::Base64":"MIME-tools","Kelp::Template":"Kelp","Lemonldap::NG::Portal::Plugins::ContextSwitching":"Lemonldap-NG-Portal","RT::Extension::MobileUI":"RT-Extension-MobileUI","Dpkg::Archive::Ar":"Dpkg","Config::Model":"Config-Model","Catalyst::ScriptRunner":"Catalyst-Runtime","Spreadsheet::ParseExcel::FmtJapan2":"Spreadsheet-ParseExcel","Devel::StackTrace":"Devel-StackTrace","CPAN::Distrostatus":"CPAN","MojoMojo::Controller::Gallery":"MojoMojo","Apache::Session::Browseable::DBI":"Apache-Session-Browseable","MojoMojo::Formatter::Markdown":"MojoMojo","Jifty::DBI::Handle::Sybase":"Jifty-DBI","Plack::Middleware::HTTPExceptions":"Plack","PApp::Exception":"PApp","Jifty::Script::Adopt":"Jifty","RPC::XML::i4":"RPC-XML","Net::DNS::Question":"Net-DNS","Sub::HandlesVia::Toolkit::Moose::RoleTrait":"Sub-HandlesVia","Lemonldap::NG::Portal::Lib::OverConf":"Lemonldap-NG-Portal","Dancer::Request":"Dancer","HTML::HeadParser":"HTML-Parser","Valiant::Util::Exception::InvalidFilterArgs":"Valiant","Apache::Session::Browseable::Store::Cassandra":"Apache-Session-Browseable","Mojo":"Mojolicious","Spoon::Template::TT2":"Spoon","IPC::Run::Win32Pump":"IPC-Run","Crypt::Perl::X509::Extension::keyUsage":"Crypt-Perl","Image::TIFF":"Image-Info","Config::Model::Role::HelpAsText":"Config-Model","Encode::Guess":"Encode","CPAN::Distroprefs::Iterator":"CPAN","MIME::Field::ContDisp":"MIME-tools","ExtUtils::Typemaps::InputMap":"ExtUtils-ParseXS","Jifty::Action::Record::Update":"Jifty","Mail::Field::AddrList":"MailTools","Mojo::Promise":"Mojolicious","Lemonldap::NG::Portal::Lib::Wrapper":"Lemonldap-NG-Portal","Image::ExifTool::MNG":"Image-ExifTool","Lemonldap::NG::Portal::Auth::Proxy":"Lemonldap-NG-Portal","Apache2::FilterRec":"mod_perl","Crypt::Passwd::XS":"Crypt-Passwd-XS","HTTP::Tiny":"HTTP-Tiny","Net::LDAP::RootDSE":"perl-ldap","Image::ExifTool::FLAC":"Image-ExifTool","Jifty::DBI::Filter::utf8":"Jifty-DBI","MM":"ExtUtils-MakeMaker","XML::LibXML":"XML-LibXML","Perlbal::Plugin::AutoRemoveLeadingDir":"Perlbal","Crypt::Mode::CBC":"CryptX","Pinto::PackageExtractor":"Pinto","Apache::Wyrd::Query":"Apache-Wyrd","Plack::Session::State::Cookie":"Plack-Middleware-Session","Email::MIME::Header":"Email-MIME","builtin":"perl","Plack::Middleware::BufferedStreaming":"Plack","CGI::apacheSSI":"CGI-apacheSSI","Crypt::Perl::X":"Crypt-Perl","GPIB::hp3585a":"GPIB","Pinto::Server":"Pinto","Pinto::Action::Diff":"Pinto","LWP::ConnCache":"libwww-perl","POE::Component::IRC::Plugin::Connector":"POE-Component-IRC","Plack::Loader":"Plack","App::Request":"App-Context","Plack::Middleware::SimpleContentFilter":"Plack","Apache::Wyrd::Services::CodeRing":"Apache-Wyrd","Jifty::View":"Jifty","Apache::Wyrd::Version":"Apache-Wyrd","DBM_Filter::compress":"perl","XML::LibXML::PI":"XML-LibXML","Net::LDAP::Extension::Cancel":"perl-ldap","MIME::Parser::FileInto":"MIME-tools","Devel::StackTrace::Frame":"Devel-StackTrace","Jifty::Plugin::CompressedCSSandJS":"Jifty","Clipboard::Pb":"Clipboard","Tk::CmdLine":"Tk","Crypt::CBC":"Crypt-CBC","PerlTmp":"Batch-Batchrun","Catalyst::Action::Serialize::JSON::XS":"Catalyst-Action-REST","Pinto::Schema::Result::Stack":"Pinto","Catalyst::Engine":"Catalyst-Runtime","Perlbal::Plugin::XFFExtras":"Perlbal","Valiant::Validator::Collection":"Valiant","LWP::DebugFile":"libwww-perl","Image::ExifTool::ICC_Profile":"Image-ExifTool","Net::OAuth::ConsumerRequest":"Net-OAuth","Valiant::Validator::Confirmation":"Valiant","Jifty::Plugin::SkeletonApp::Dispatcher":"Jifty","WebService::Xero::Organisation":"WebService-Xero","Net::SNMP::Message":"Net-SNMP","Kelp::Module::Config":"Kelp","Net::LDAP::Control::EntryChange":"perl-ldap","Jifty::JSON":"Jifty","Net::DNS::RR::OPENPGPKEY":"Net-DNS","Lemonldap::NG::Portal::CertificateResetByMail::Demo":"Lemonldap-NG-Portal","Jifty::Plugin::Authentication::Password::Notification::ConfirmEmail":"Jifty","Image::ExifTool::MXF":"Image-ExifTool","Net::Server::Single":"Net-Server","Dancer::Template":"Dancer","Crypt::Digest::SHA512_224":"CryptX","Kelp::Module::Template::Null":"Kelp","ExtUtils::Embed":"perl","SOAP::XMLSchema1999::Deserializer":"SOAP-Lite","Plack::Middleware::Session::Cookie":"Plack-Middleware-Session","Mojo::UserAgent::CookieJar":"Mojolicious","Kossy::BodyParser::JSON":"Kossy","Valiant::HTML::SafeString":"Valiant","SSL_HANDLE":"IO-Socket-SSL","Plack::Response":"Plack","Apache::App":"App-Context","DBI::common":"DBI","Image::ExifTool::PostScript":"Image-ExifTool","CGI::Application::Dispatch::PSGI":"CGI-Application-Dispatch","GitLab::API::v4::Paginator":"GitLab-API-v4","Tk::Event":"Tk","Dancer::ModuleLoader":"Dancer","Net::Dropbear::XS::SessionAccept":"Net-Dropbear","Jifty::Plugin::AdminUI::Dispatcher":"Jifty","Dancer2::Core::Role::ConfigReader":"Dancer2","PApp::XML::Template":"PApp","Plack::Server::Standalone::Prefork":"Plack","Dancer2::Core::Session":"Dancer2","Jifty::DBI":"Jifty-DBI","APR::Brigade":"mod_perl","Moxy::Plugin::HTTPHeader":"Moxy","Dpkg::BuildOptions":"Dpkg","Spreadsheet::ParseXLSX::Cell":"Spreadsheet-ParseXLSX","Jifty::Script::Plugin":"Jifty","App":"App-Context","Net::DNS::RR::OPT::DAU":"Net-DNS","PAR::Heavy":"PAR","MHonArc::CharEnt::HP_ROMAN8":"MHonArc","Jifty::Plugin::PubSub::Subscriptions":"Jifty","Image::ExifTool::MacOS":"Image-ExifTool","Dpkg::BuildInfo":"Dpkg","Valiant::I18N":"Valiant","ExtUtils::MM_Cygwin":"ExtUtils-MakeMaker","Net::Server::HTTP":"Net-Server","MHonArc::Char::JP":"MHonArc","Crypt::Cipher::Twofish":"CryptX","POSIX":"perl","YAML::Types":"YAML","YAML::Type::blessed":"YAML","Legacy::Graphics::Browser":"GBrowse","Pinto::Schema::ResultSet::Registration":"Pinto","Apache2::ConstantsTable":"mod_perl","Bio::Graphics::Browser2::DataLoader::gff":"GBrowse","MojoMojo::Formatter::CPANHyperlink":"MojoMojo","Bio::Graphics::Browser2::RegionSearch":"GBrowse","Net::DNS::ZoneFile::Text":"Net-DNS","Config::Model::Exception::ConfigFile::Missing":"Config-Model","Dpkg::Vendor::PureOS":"Dpkg","App::Context":"App-Context","App::Security":"App-Context","Mojo::Loader":"Mojolicious","Valiant::Validations":"Valiant","Log::Any::Adapter::Capture":"Log-Any","IO::Compress::Zip::Constants":"IO-Compress","XML::LibXML::Element":"XML-LibXML","DBD::SQLite":"DBD-SQLite","Zonemaster::Backend::Error::ResourceNotFound":"Zonemaster-Backend","Module::Provision::TraitFor::AddingFiles":"Module-Provision","O":"perl","Plack::App::Directory":"Plack","Config::Model::FuseUI":"Config-Model","Net::DNS::RR::MINFO":"Net-DNS","Spoon::Lookup":"Spoon","Apache::Symdump":"mod_perl","Apache::Wyrd::Site::SearchResults":"Apache-Wyrd","Jifty::Plugin::Authentication::Password::Action::GeneratePasswordToken":"Jifty","PAR::Filter::Bytecode":"PAR-Packer","Kelp::Response":"Kelp","SOAP::Schema::Deserializer":"SOAP-Lite","Net::DNS::RR::RESINFO":"Net-DNS","Image::ExifTool::FlashPix":"Image-ExifTool","Valiant::HTML::Util::TagBuilder":"Valiant","Crypt::Perl::X509::GeneralName":"Crypt-Perl","Mail::Header":"MailTools","APR::Finfo":"mod_perl","DBIx::Custom::Model":"DBIx-Custom","Mojolicious::Command::inflate":"Mojolicious","Cwd":"PathTools","DBIx::Class::Valiant::Validator::Result":"Valiant","Email::MIME":"Email-MIME","HeaderParser":"perl","SVN::Look":"SVN-Look","Pod::Perldoc::ToANSI":"Pod-Perldoc","Dancer::Route":"Dancer","Apache::SessionX":"Apache-SessionX","DBD::Mem::DataSource":"DBI","CGI::Session::Driver::mysql":"CGI-Session","MojoMojo::Formatter::Text":"MojoMojo","Sub::HandlesVia::HandlerLibrary::Code":"Sub-HandlesVia","MIME::WordDecoder":"MIME-tools","MHonArc::Char":"MHonArc","Plack":"Plack","Image::ExifTool::QuickTime":"Image-ExifTool","Plack::Session::Store::File":"Plack-Middleware-Session","MIME::Parser::Reader":"MIME-tools","Net::LDAP::Control::SyncState":"perl-ldap","Mojo::UserAgent::Server":"Mojolicious","HTML::EP::Install":"HTML-EP","Image::ExifTool::BuildTagLookup":"Image-ExifTool","Dpkg::Dist::Files":"Dpkg","POE::Component::IRC::Plugin::AutoJoin":"POE-Component-IRC","Valiant::NestedError":"Valiant","MHonArc::UTF8::EUC_JP":"MHonArc","IO::Compress::Zip":"IO-Compress","Crypt::Perl::RSA::PublicKey":"Crypt-Perl","GitUtils":"perl","CGI::Session::ID::md5":"CGI-Session","Dancer2::CLI::Gen":"Dancer2","Plack::Server::ServerSimple":"Plack","DBI::DBD::SqlEngine::TieTables":"DBI","Perlbal::Socket":"Perlbal","Kelp::Module::Routes":"Kelp","Lemonldap::NG::Portal::Lib::WebAuthn":"Lemonldap-NG-Portal","Valiant::Filter::Lower":"Valiant","Net::DNS::RR::NID":"Net-DNS","OS2::PrfDB::Sub":"perl","WebService::Xero::Contact":"WebService-Xero","Valiant::Util::Exception::General":"Valiant","Apache2::Log":"mod_perl","File::DataClass::Functions":"File-DataClass","Image::ExifTool::Theora":"Image-ExifTool","Pinto":"Pinto","Tk::Pixmap":"Tk","Jifty::Plugin::ViewDeclarePage":"Jifty","Compress::Raw::Bzip2":"Compress-Raw-Bzip2","Net::DNS::RR::SPF":"Net-DNS","Valiant::Filterable":"Valiant","Mojolicious::Plugin::Mount":"Mojolicious","Jifty::Plugin::AdminUI":"Jifty","IPC::Run::Debug":"IPC-Run","UI::Dialog::Backend::KDialog":"UI-Dialog","Apache2::MPM":"mod_perl","ModPerl::BuildOptions":"mod_perl","Dancer::Exception::Base":"Dancer","Dancer::Object::Singleton":"Dancer","Mite::Config":"Mite","CGI::Simple::Standard":"CGI-Simple","MHonArc::UTF8::CP1252":"MHonArc","Lemonldap::NG::Portal::Lib::CustomModule":"Lemonldap-NG-Portal","Crypt::Digest::BLAKE2s_256":"CryptX","Pinto::Editor::Edit":"Pinto","Perlbal::Plugin::Cgilike::Request":"Perlbal","Crypt::Perl::RSA":"Crypt-Perl","Dancer2::Core::Role::Handler":"Dancer2","RT::Authen::ExternalAuth::DBI::Cookie":"RT-Authen-ExternalAuth","CBOR::XS":"CBOR-XS","MHonArc::CharEnt::ISO8859_14":"MHonArc","Lemonldap::NG::Portal::Main::Auth":"Lemonldap-NG-Portal","PGObject::Util::DBAdmin":"PGObject-Util-DBAdmin","Mail::Filter":"MailTools","Plack::Middleware::Static":"Plack","Bio::Graphics::Browser2::MetaDB":"GBrowse","Net::Server::Proto::SSLEAY":"Net-Server","Crypt::Random::Source::Weak":"Crypt-Random-Source","Mojolicious::Plugin::OAuth2":"Mojolicious-Plugin-OAuth2","Dancer2::Logger::Capture":"Dancer2","MHonArc::CharEnt::CP936":"MHonArc","Graphics::ColorNames::X":"Graphics-ColorNames","Storable":"Storable","Apache::URI":"mod_perl","File::KeePass":"File-KeePass","DBDI":"DBI","MIME::ToolUtils":"MIME-tools","Catalyst":"Catalyst-Runtime","Config::Model::Exception::Fatal":"Config-Model","Lemonldap::NG::Portal::Lib::OpenIDConnect":"Lemonldap-NG-Portal","Crypt::Random::Source::Base::Proc":"Crypt-Random-Source","Zonemaster::Backend::Translator":"Zonemaster-Backend","Clipboard::Xsel":"Clipboard","DBI::Util::_accessor":"DBI","App::Context::POE::Server":"App-Context","DBD::ExampleP::dr":"DBI","POE::Component::IRC::Plugin::ISupport":"POE-Component-IRC","Pinto::Manual::QuickStart":"Pinto","Lemonldap::NG::Portal::Main::Process":"Lemonldap-NG-Portal","MojoMojo::Schema::Result::Entry":"MojoMojo","DBD::Proxy::db":"DBI","Convert::UUlib":"Convert-UUlib","Net::DNS::RR::OPT::EXPIRE":"Net-DNS","Dancer::Route::Registry":"Dancer","Net::DNS::RR::OPT::COOKIE":"Net-DNS","RPC::PlServer":"PlRPC","Jifty::Plugin::CompressedCSSandJS::Dispatcher":"Jifty","warnings":"perl","Image::ExifTool::Lang::tr":"Image-ExifTool","Moxy::Plugin::GPS":"Moxy","LWP::Protocol::https":"LWP-Protocol-https","Plack::Middleware::IIS6ScriptNameFix":"Plack","Net::DNS::RR::NSEC":"Net-DNS","Dancer::Exception":"Dancer","Lemonldap::NG::Portal::Plugins::CheckDevOps":"Lemonldap-NG-Portal","Dpkg::Source::Package::V3::Quilt":"Dpkg","DBD::File::st":"DBI","Elive::Entity::Group::Members":"Elive","Tk::TixGrid":"Tk","DBIx::Class::EncodedColumn::Crypt::OpenPGP":"DBIx-Class-EncodedColumn","APR::Bucket":"mod_perl","Net::DNS::RR::AMTRELAY":"Net-DNS","XML::Twig::Entity_list":"XML-Twig","Tk::Wm":"Tk","Valiant::Validator::Boolean":"Valiant","Log::Any::Adapter::Multiplex":"Log-Any","HTTP::Session2::Expired":"HTTP-Session2","Lemonldap::NG::Portal::2F::Register::WebAuthn":"Lemonldap-NG-Portal","Crypt::Cipher::KASUMI":"CryptX","POE::Component::IRC::Plugin::DCC":"POE-Component-IRC","XML::Atom::Entry":"XML-Atom","Crypt::Digest::BLAKE2s_224":"CryptX","Plack::Middleware::XSRFBlock":"Plack-Middleware-XSRFBlock","Crypt::Cipher::RC5":"CryptX","Tk::Configure":"Tk","Plack::Handler::Apache1":"Plack","Net::CIDR::Lite":"Net-CIDR-Lite","PAR::SetupTemp":"PAR","YAML::Type::glob":"YAML","Spreadsheet::ParseExcel::Worksheet":"Spreadsheet-ParseExcel","Dpkg::OpenPGP::Backend::SOP":"Dpkg","IO::Uncompress::AnyUncompress":"IO-Compress","Tk::DirTree":"Tk","Apache::Wyrd::Input":"Apache-Wyrd","Image::ExifTool::Leaf":"Image-ExifTool","Log::Any::Adapter::Core":"Log-Any","Image::ExifTool::Radiance":"Image-ExifTool","Tk::Menu::Button":"Tk","Jifty::DBI::Record::Cachable":"Jifty-DBI","IO::Socket::SSL::OCSP_Cache":"IO-Socket-SSL","App::Pinto::Command::kill":"Pinto","Apache::Wyrd::Chart":"Apache-Wyrd","ExtUtils::MM_VOS":"ExtUtils-MakeMaker","Lemonldap::NG::Portal::Main::Constants":"Lemonldap-NG-Portal","Jifty::Notification":"Jifty","Crypt::Mode::CFB":"CryptX","CPAN::Shell":"CPAN","Config::Model::Role::Grab":"Config-Model","PApp::I18n::PO_Writer":"PApp","HTTP::Session2::Base":"HTTP-Session2","Jifty::Request::StateVariable":"Jifty","Image::ExifTool::Ogg":"Image-ExifTool","Catalyst::Request::PartData":"Catalyst-Runtime","Valiant::Validator::Object":"Valiant","Mojo::Parameters":"Mojolicious","MHonArc::UTF8::CP1256":"MHonArc","Apache::Wyrd::Datum::Set":"Apache-Wyrd","Perlbal::ChunkedUploadState":"Perlbal","B::Section":"perl","Net::Dropbear::XS":"Net-Dropbear","MHonArc::CharEnt::CP1252":"MHonArc","Image::ExifTool::Canon":"Image-ExifTool","Config::Model::Exception::LoadData":"Config-Model","Jifty::Action::Record":"Jifty","MojoMojo::Schema::Result::Attachment":"MojoMojo","Net::DNS::RR::APL":"Net-DNS","Config::Model::Exception::ConfigFile":"Config-Model","MIME::Decoder::UU":"MIME-tools","Jifty::Server::Fork::NetServer":"Jifty","Pinto::Database":"Pinto","Crypt::Cipher::CAST5":"CryptX","MHonArc::CharEnt::ISO8859_8":"MHonArc","ExtUtils::ParseXS::Eval":"ExtUtils-ParseXS","File::Spec::Functions":"PathTools","File::DataClass::ResultSet":"File-DataClass","Image::ExifTool::Fixup":"Image-ExifTool","APR::Request":"libapreq2","Net::DNS::RR::ISDN":"Net-DNS","Tk::Dirlist":"Tk","POE::Component::IRC::Common":"POE-Component-IRC","Apache::Wyrd::LogDump":"Apache-Wyrd","Image::ExifTool::Photoshop":"Image-ExifTool","Net::OAuth::UserAuthRequest":"Net-OAuth","MyStripScripts":"HTML-StripScripts","CPAN::FirstTime":"CPAN","Plack::Server::CGI":"Plack","MHonArc::UTF8::ISO8859_2":"MHonArc","Dancer2::Serializer::Dumper":"Dancer2","Valiant::HTML::Util::FormTags":"Valiant","PAR::StrippedPARL::Base":"PAR-Packer","Net::OAuth::Message":"Net-OAuth","YAML::Dumper":"YAML","Bio::Graphics::Browser2::DataSource":"GBrowse","Mojo::Message::Request":"Mojolicious","CGI::Session::Tutorial":"CGI-Session","SOAP::SOM":"SOAP-Lite","Jifty::Script::Schema":"Jifty","Crypt::Random::Generator":"Crypt-Random","Lemonldap::NG::Portal::2F::REST":"Lemonldap-NG-Portal","HTTP::Body::XFormsMultipart":"HTTP-Body","Lemonldap::NG::Portal::Auth::GPG":"Lemonldap-NG-Portal","ModPerl::RegistryCooker":"mod_perl","Perlbal::Plugin::Vpaths":"Perlbal","DBD::NullP::dr":"DBI","Crypt::Perl::ASN1::BitString":"Crypt-Perl","Imager::Expr::Infix":"Imager","Apache::Wyrd::Lib":"Apache-Wyrd","Crypt::PRNG::Fortuna":"CryptX","Batch::Batchrun::Initialize":"Batch-Batchrun","Mail::Audit::Vacation":"Mail-Audit","Bio::DB::SeqFeature::Store::Alias::Segment":"GBrowse","Jifty::View::Declare::Page":"Jifty","RPC::PlServer::Test":"PlRPC","Dpkg::Control::Fields":"Dpkg","Crypt::Perl::RSA::PKCS1_v1_5":"Crypt-Perl","Catalyst::Model":"Catalyst-Runtime","Config::Model::TermUI":"Config-Model","Tk::Button":"Tk","Crypt::Perl::X509::Extension::freshestCRL":"Crypt-Perl","RPC::PlClient::Object":"PlRPC","Bio::Graphics::Browser2::Region":"GBrowse","Net::LDAP::DSML":"perl-ldap","Mite::Class":"Mite","SOAP::Server::Object":"SOAP-Lite","Apache::PerlRun":"mod_perl","Image::ExifTool::Font":"Image-ExifTool","Mojo::Server::PSGI::_IO":"Mojolicious","Net::DNS::RR::OPT::ZONEVERSION":"Net-DNS","Net::DNS::Nameserver":"Net-DNS","MojoMojo::Formatter::RSS":"MojoMojo","Apache2::ParseSource":"mod_perl","CGI::Simple::Cookie":"CGI-Simple","Image::ExifTool::IPTC":"Image-ExifTool","File::Find":"perl","Plack::Middleware::Statsd":"Plack-Middleware-Statsd","Plack::Session::Cleanup":"Plack-Middleware-Session","Jifty::Web::Form::Field::Combobox":"Jifty","Perlbal::Plugin::MaxContentLength":"Perlbal","PApp::CGI::Connection":"PApp","Module::Provision::MetaData":"Module-Provision","PApp::XML::Pod2xml":"PApp","App::Pinto::Command::unregister":"Pinto","Jifty::CAS":"Jifty","Net::DNS::Mailbox2535":"Net-DNS","PhonyClipboard":"Clipboard","Bio::Graphics::Browser2::MetaSegment::Iterator":"GBrowse","Encode::KR":"Encode","XAO::DO::Web::MultiPageNav":"XAO-Web","Lemonldap::NG::Portal::Password::Choice":"Lemonldap-NG-Portal","Moxy::Plugin::RelativeLocation":"Moxy","Dancer2::Core::Request::Upload":"Dancer2","App::Serializer::Storable":"App-Context","Net::IPAddress::Util::Collection::Tie":"Net-IPAddress-Util","B":"perl","DBD::Pg":"DBD-Pg","Perlbal::Plugin::Throttle":"Perlbal","POE::Component::IRC::State":"POE-Component-IRC","Lemonldap::NG::Portal::Plugins::CDA":"Lemonldap-NG-Portal","encoding":"Encode","Net::protoent":"perl","Crypt::Perl::BigInt":"Crypt-Perl","Imager::Probe":"Imager","Apache::MP3::L10N::ca":"Apache-MP3","Net::DNS::RR::OPT::NSID":"Net-DNS","Bio::Graphics::Browser2::DataLoader::wig2bigwig":"GBrowse","Pod::Simple::XHTML::LocalPodLinks":"perl","Catalyst::ActionRole::QueryMatching":"Catalyst-Runtime","Net::DNS::RR::AAAA":"Net-DNS","XML::LibXML::Error":"XML-LibXML","MojoMojo::Schema::ResultSet::Role":"MojoMojo","DBI::DBD":"DBI","ModPerl::MapBase":"mod_perl","Net::LDAP::Control::MatchedValues":"perl-ldap","Dpkg::Control::Changelog":"Dpkg","Jifty::Web::Form::Field::Select":"Jifty","DBIx::Custom::Order":"DBIx-Custom","Catalyst::Action::Serialize::YAML":"Catalyst-Action-REST","Pinto::Action::Pull":"Pinto","HTML::EP::Tokens":"HTML-EP","Dancer::Continuation::Route":"Dancer","Archive::Zip::StringMember":"Archive-Zip","Crypt::Cipher::DES":"CryptX","Mojo::ByteStream":"Mojolicious","Jifty::Web::Session::ApacheSession":"Jifty","Valiant::HTML::Tag":"Valiant","Net::DNS::RR::IPSECKEY":"Net-DNS","Lemonldap::NG::Portal::Lib::U2F":"Lemonldap-NG-Portal","SOAP::XMLSchema2001::Serializer":"SOAP-Lite","Net::DNS::ZoneFile":"Net-DNS","Valiant::HTML::Components":"Valiant","Tk::Compound":"Tk","Image::ExifTool::GM":"Image-ExifTool","Apache::ASP::Session":"Apache-ASP","attrs":"perl","Legacy::Graphics::Browser::Synteny":"GBrowse","App::Serializer::Properties":"App-Context","Jifty::DBI::Column":"Jifty-DBI","Search::OpenSearch::Server::Plack":"Search-OpenSearch-Server","Jifty::Action::Record::Create":"Jifty","Dpkg::Control::HashCore":"Dpkg","Crypt::CBC::PBKDF::pbkdf2":"Crypt-CBC","Fake::Encode":"Fake-Encode","Dancer2::Template::Simple":"Dancer2","Jifty::Server":"Jifty","Bundle::Apache::ASP::Extra":"Apache-ASP","Apache::MP3::L10N::nb":"Apache-MP3","Jifty::Plugin::Authentication::Password::Action::ConfirmEmail":"Jifty","MHonArc::UTF8::BIG5_HKSCS":"MHonArc","Imager::Matrix2d":"Imager","Zonemaster::Backend::Metrics":"Zonemaster-Backend","Tk::Optionmenu":"Tk","App::Serializer::Perl":"App-Context","Net::DNS::RR::CDS":"Net-DNS","Plack::Middleware":"Plack","FileSlurp_12":"File-Slurp","Crypt::AuthEnc::ChaCha20Poly1305":"CryptX","Pinto::Schema::Result::Ancestry":"Pinto","Zlib::OldInflate":"IO-Compress","XAO::DO::Web::IdentifyAgent":"XAO-Web","Bio::Graphics::Browser2::TrackDumper":"GBrowse","APR::Pool":"mod_perl","Moxy::Util":"Moxy","Valiant::JSON::Util":"Valiant","Apache::MP3::L10N::sr":"Apache-MP3","Spoon::Formatter::Container":"Spoon","ExtUtils::MM_NW5":"ExtUtils-MakeMaker","MHonArc::UTF8::AppleCroatian":"MHonArc","DBD::mysql::st":"DBD-mysql","PAR::Filter::PodStrip":"PAR-Packer","Apache2::porting":"mod_perl","App::CallDispatcher::HTTPSimple":"App-Context","Config::Model::Exception::UnknownElement":"Config-Model","Jifty::DBI::Filter::Time":"Jifty-DBI","Apache2::PerlSections":"mod_perl","YAML::LibYAML":"YAML-LibYAML","Crypt::Perl::X509::Extension::subjectAltName":"Crypt-Perl","Image::ExifTool::NikonCapture":"Image-ExifTool","FileHandle":"perl","DBD::Gofer::db":"DBI","MojoMojo::Controller::User":"MojoMojo","Dancer2::Handler::AutoPage":"Dancer2","ModPerl::MM":"mod_perl","IO::Compress::Zlib::Constants":"IO-Compress","feature":"perl","Plack::Server::Apache2":"Plack","Pod::Html::Util":"perl","Apache2::Build":"mod_perl","Valiant":"Valiant","Jifty::Schema":"Jifty","App::Cpan":"CPAN","Apache::SOAP":"SOAP-Lite","Tie::Scalar":"perl","Net::IPAddress::Util::Range":"Net-IPAddress-Util","Config::Model::Iterator":"Config-Model","Tk::Radiobutton":"Tk","CGI::Session::Driver::file":"CGI-Session","Crypt::Perl::PKCS8":"Crypt-Perl","Zonemaster::Backend::Log":"Zonemaster-Backend","Jifty::Model::Metadata":"Jifty","Valiant::HTML::FormBuilder::DefaultModel":"Valiant","Image::ExifTool::Lang::nl":"Image-ExifTool","Crypt::Perl::ECDSA::EC::Point":"Crypt-Perl","Crypt::Perl::X509::Extension::noCheck":"Crypt-Perl","POE::Component::IRC::Qnet":"POE-Component-IRC","Log::Any::Adapter::Stdout":"Log-Any","Legacy::Graphics::BrowserConfig":"GBrowse","XAO::DO::Web::Cookie":"XAO-Web","Image::ExifTool::PGF":"Image-ExifTool","MHonArc::UTF8::CP1255":"MHonArc","YAML::Type::ref":"YAML","Catalyst::Exception::Detach":"Catalyst-Runtime","MIME::WordDecoder::UTF_8":"MIME-tools","Jifty::DBI::Schema":"Jifty-DBI","CGI::Simple":"CGI-Simple","Image::ExifTool::Pentax":"Image-ExifTool","mod_perl":"mod_perl","Lemonldap::NG::Portal::Auth::OpenID":"Lemonldap-NG-Portal","Dancer2::Core::Types":"Dancer2","Dancer::Session::Simple":"Dancer","Jifty::Filter::DateTime":"Jifty","Apache::Debug":"mod_perl","Apache::Wyrd::Services::Index":"Apache-Wyrd","Net::Dropbear":"Net-Dropbear","XAO::DO::Web::Header":"XAO-Web","App::Pinto::Command::unpin":"Pinto","Archive::Tar":"Archive-Tar","SOAP::XMLSchema2001::Deserializer":"SOAP-Lite","XML::LibXML::Node":"XML-LibXML","Crypt::Perl::X::ASN1::Encode":"Crypt-Perl","Net::SNMP::Transport::UDP6":"Net-SNMP","Filesys::SmbClientParser":"Filesys-SmbClientParser","Jifty::Plugin::User":"Jifty","Jifty::Web::Form::Field::Collection":"Jifty","MojoMojo::Formatter::Pod":"MojoMojo","Image::ExifTool::Nikon":"Image-ExifTool","CPAN::Mirrors":"CPAN","filetest":"perl","Jifty::Request::Action":"Jifty","Kelp::Module::Template":"Kelp","Image::ExifTool::FujiFilm":"Image-ExifTool","Apache::Session::Browseable::Store::Postgres":"Apache-Session-Browseable","Perlbal::Test":"Perlbal","Net::LDAP::Reference":"perl-ldap","Jifty::Action::Record::Bulk":"Jifty","Clipboard::WaylandClipboard":"Clipboard","Net::OAuth::SignatureMethod::RSA_SHA1":"Net-OAuth","Kelp::Test::CookieJar":"Kelp","Perlbal::Test::WebClient":"Perlbal","Jifty::Web::Session::None":"Jifty","XML::Atom::Namespace":"XML-Atom","Image::ExifTool::ICO":"Image-ExifTool","LWP::Authen::Basic":"libwww-perl","Lemonldap::NG::Portal::2F::Okta":"Lemonldap-NG-Portal","Jifty::DBI::Filter":"Jifty-DBI","Valiant::Filter::Collapse":"Valiant","Mojolicious::Routes":"Mojolicious","Apache::MP3::L10N::nn_no":"Apache-MP3","LWP::Protocol":"libwww-perl","MDK::Common::DataStructure":"MDK-Common","Net::Server::MultiType":"Net-Server","My::Examples":"SOAP-Lite","Pinto::Action::Pin":"Pinto","Apache::XMLRPC::Lite":"SOAP-Lite","Apache::Server":"mod_perl","ExtUtils::Typemaps::Type":"ExtUtils-ParseXS","Crypt::Cipher::Blowfish":"CryptX","Apache::ModuleConfig":"mod_perl","Crypt::Cipher::RC2":"CryptX","Apache::Wyrd::Site::IndexBot":"Apache-Wyrd","Test::Mojo":"Mojolicious","MojoMojo::Formatter::File::Pod":"MojoMojo","Apache::Util":"mod_perl","PApp::I18n":"PApp","Crypt::Perl::X509::RelativeDistinguishedName":"Crypt-Perl","CPAN::Exception::yaml_not_installed":"CPAN","Spoon::Hub":"Spoon","Config::Model::Instance":"Config-Model","Tk::FloatEntry":"Tk","SOAP::Custom::XML::Deserializer":"SOAP-Lite","Catalyst::Request::Upload":"Catalyst-Runtime","Otogiri":"Otogiri","Sub::HandlesVia::Toolkit::Mouse::RoleTrait":"Sub-HandlesVia","Config::Model::Exception::AncestorClass":"Config-Model","Lemonldap::NG::Portal::Lib::Slave":"Lemonldap-NG-Portal","Elive::View::Session":"Elive","Dancer::Handler::Standalone":"Dancer","Lemonldap::NG::Portal::Plugins::DecryptValue":"Lemonldap-NG-Portal","DBI::ProfileSubs":"DBI","Moxy::Plugin::XMLisHTML":"Moxy","Net::DNS::RR::SSHFP":"Net-DNS","XAO::DO::CGI":"XAO-Web","Sub::HandlesVia::Toolkit::Moose::PackageTrait":"Sub-HandlesVia","Mite::Trait::HasRequiredMethods":"Mite","Jifty::Plugin::SetupWizard::Action::TestDatabaseConnectivity":"Jifty","DBI::DBD::SqlEngine::Table":"DBI","Catalyst::Action::Serialize::JSONP":"Catalyst-Action-REST","CPAN::Distroprefs::Result::Error":"CPAN","Catalyst::Request":"Catalyst-Runtime","APR::BucketType":"mod_perl","Apache2::compat":"mod_perl","App::Pinto::Command::merge":"Pinto","Galileo::Command::setup":"Galileo","File::stat":"perl","DBI::Library":"MySQL-Admin","Apache::httpd_conf":"mod_perl","CPAN::HTTP::Credentials":"CPAN","Image::ExifTool::Reconyx":"Image-ExifTool","Apache::MP3::L10N::sl":"Apache-MP3","Lemonldap::NG::Portal::Auth::Facebook":"Lemonldap-NG-Portal","ojo":"Mojolicious","Catalyst::Middleware::Stash":"Catalyst-Runtime","YAML::Type::undef":"YAML","MHonArc::RFC822":"MHonArc","integer":"perl","Pinto::Action::Roots":"Pinto","MHonArc::UTF8::KOI8_A":"MHonArc","Jifty::DBI::Collection::Unique":"Jifty-DBI","Catalyst::Response":"Catalyst-Runtime","Dpkg::Deps::Simple":"Dpkg","Crypt::Digest::Keccak384":"CryptX","Valiant::Translation":"Valiant","Apache::MP3::L10N::es":"Apache-MP3","HTML::EP::Session::Cookie":"HTML-EP","App::Pinto::Command::props":"Pinto","Unicode::UCD":"perl","Lemonldap::NG::Portal::Lib::SOAPProxy":"Lemonldap-NG-Portal","Pinto::Locator":"Pinto","Dancer2::Core::Role::SessionFactory":"Dancer2","Net::Server::Log::Log::Log4perl":"Net-Server","Net::SNMP::Transport::IPv6::UDP":"Net-SNMP","Image::ExifTool::Flash":"Image-ExifTool","Moxy::Plugin::ShowHTMLSource":"Moxy","Lemonldap::NG::Portal::Plugins::CrowdSec":"Lemonldap-NG-Portal","XML::LibXML::Dtd":"XML-LibXML","Net::DNS::RR::DSYNC":"Net-DNS","Crypt::Checksum::Adler32":"CryptX","Archive::Tar::Std":"Archive-Tar","Tie::StdArray":"perl","Lemonldap::NG::Portal::MenuTab":"Lemonldap-NG-Portal","Dancer2::Plugin":"Dancer2","CGI::Application::Plugin::AutoRunmode":"CGI-Application-Plugin-AutoRunmode","MIME::WordDecoder::US_ASCII":"MIME-tools","SOAP::Transport::LOOPBACK::Client":"SOAP-Lite","Perlbal::ClientHTTPBase":"Perlbal","Amiga::ARexx":"perl","Galileo":"Galileo","MojoMojo::Schema::ResultSet::Content":"MojoMojo","App::Pinto::Command::rename":"Pinto","SOAP::Transport::MAILTO::Client":"SOAP-Lite","Lemonldap::NG::Portal::Auth::PAM":"Lemonldap-NG-Portal","Crypt::Mode::OFB":"CryptX","Catalyst::Plugin::Unicode::Encoding":"Catalyst-Runtime","Net::DNS::RR::TXT":"Net-DNS","Jifty::Plugin":"Jifty","ExtUtils::MM_Darwin":"ExtUtils-MakeMaker","Tk::After":"Tk","Moxy::Plugin::ResponseTime":"Moxy","ExtUtils::MM_VMS":"ExtUtils-MakeMaker","Mojo::Cookie":"Mojolicious","XML::Atom":"XML-Atom","Mail::Audit::KillDups":"Mail-Audit","Mojolicious::Command::cpanify":"Mojolicious","Encode::Alias":"Encode","Net::DNS::RR::RRSIG":"Net-DNS","Pinto::Action":"Pinto","Lemonldap::NG::Portal::CDC":"Lemonldap-NG-Portal","SOAP::Test":"SOAP-Lite","Apache::ASP::Request":"Apache-ASP","Lemonldap::NG::Portal::Lib::Okta":"Lemonldap-NG-Portal","ExtUtils::Mksymlists":"ExtUtils-MakeMaker","MojoMojo::Controller::Admin":"MojoMojo","Mojolicious::Command::generate::app":"Mojolicious","Dpkg::Deps":"Dpkg","MY":"ExtUtils-MakeMaker","Elive::Entity::Preload":"Elive","PerlIO::encoding":"perl","Plack::Middleware::Log4perl":"Plack","Galileo::DB::Schema::Result::Menu":"Galileo","LWP::MemberMixin":"libwww-perl","Image::ExifTool::NikonCustom":"Image-ExifTool","Imager::Test":"Imager","Pinto::Action::Unregister":"Pinto","Dpkg::Changelog::Entry::Debian":"Dpkg","DBD::mysqlPP::st":"DBD-mysqlPP","App::Conf::File":"App-Context","Tk::Region":"Tk","Apache::Session::Browseable::Store::MySQL":"Apache-Session-Browseable","Crypt::Random::Source::Weak::devurandom":"Crypt-Random-Source","Jifty::CAS::Store::Memory":"Jifty","MojoMojo::Formatter::Include":"MojoMojo","DBI::DBD::SqlEngine::db":"DBI","DBI::Const::GetInfo::ODBC":"DBI","Mojolicious::Command::Author::generate::lite_app":"Mojolicious","MHonArc::UTF8::KOI8_E":"MHonArc","Mojo::IOLoop::Client":"Mojolicious","MHonArc::CharEnt::AppleCroatian":"MHonArc","Crypt::Cipher::SAFER_K128":"CryptX","App::Pinto::Command::look":"Pinto","Jifty::Web::Form::Field::Uploads":"Jifty","Plack::Handler::CGI":"Plack","Mojo::Server::Hypnotoad":"Mojolicious","Plack::TempBuffer::File":"Plack","Catalyst::Action::Deserialize::XML::Simple":"Catalyst-Action-REST","Win32::File::Summary":"Win32-File-Summary","HTML::EP::Session::Dumper":"HTML-EP","Imager::Regops":"Imager","Lemonldap::NG::Portal::Plugins::Register":"Lemonldap-NG-Portal","RPC::XML::double":"RPC-XML","MojoMojo::WordDiff":"MojoMojo","Dpkg::Source::Package::V3::Custom":"Dpkg","PApp::DataRef::Scalar::Proxy":"PApp","DBIx::Class::Valiant":"Valiant","Net::LDAP::Control::TreeDelete":"perl-ldap","XML::Twig::XPath::Attribute":"XML-Twig","App::Packer::PAR":"PAR-Packer","Lemonldap::NG::Portal::Plugins::GlobalLogout":"Lemonldap-NG-Portal","Pod::Perldoc::ToTk":"Pod-Perldoc","XAO::DO::Web::Benchmark":"XAO-Web","POE::Component::IRC::Constants":"POE-Component-IRC","Image::ExifTool::DPX":"Image-ExifTool","Image::ExifTool::DICOM":"Image-ExifTool","GPIB::rmt":"GPIB","Galileo::DB::Schema::Result::User":"Galileo","App::Reference":"App-Context","DBI::Const::GetInfoReturn":"DBI","Jifty::View::Declare::Handler":"Jifty","Jifty::Plugin::SQLQueries":"Jifty","XAO::DO::Web::Utility":"XAO-Web","DBM_Filter::encode":"perl","Tk::Reindex":"Tk","IO::Uncompress::AnyInflate":"IO-Compress","Dpkg::OpenPGP::KeyHandle":"Dpkg","Lemonldap::NG::Portal::Issuer::OpenID":"Lemonldap-NG-Portal","Imager::Color":"Imager","Tk::Tree":"Tk","ModPerl::TiPoolConfig":"mod_perl","Fh":"CGI","SOAP::Lite::COM":"SOAP-Lite","XAO::Templates":"XAO-Web","Lemonldap::NG::Portal::Plugins::OIDCNativeSso":"Lemonldap-NG-Portal","Pinto::Manual::Tutorial":"Pinto","Config::Model::Role::NodeLoader":"Config-Model","Image::Info::SVG::XMLSimple":"Image-Info","OS2::REXX::_HASH":"perl","Lemonldap::NG::Portal::Lib::OpenID::Server":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Password::Combination":"Lemonldap-NG-Portal","SSL_Context":"IO-Socket-SSL","Jifty::Script":"Jifty","ExtUtils::MakeMaker::_version":"ExtUtils-MakeMaker","YAML::Loader":"YAML","Dancer::Logger::Null":"Dancer","ExtUtils::Mkbootstrap":"ExtUtils-MakeMaker","Apache::Wyrd::Handler":"Apache-Wyrd","RTMP::Client":"RTMP-Client","PAR::Filter::Obfuscate":"PAR-Packer","DBM_Filter::int32":"perl","Image::ExifTool::XMP":"Image-ExifTool","Mite::Attribute":"Mite","Apache::Leak":"mod_perl","MojoMojo::Schema::Result::Comment":"MojoMojo","Net::LDAP::Filter":"perl-ldap","Net::DNS::RR::L64":"Net-DNS","Batch::Batchrun::ProcessSteps":"Batch-Batchrun","Lemonldap::NG::Portal::Plugins::SingleSession":"Lemonldap-NG-Portal","Dancer::Continuation":"Dancer","Apache::PerlRunXS":"mod_perl","Imager::Expr":"Imager","File::DosGlob":"perl","IPC::Cmd::System":"IPC-Cmd","App::ResourceLocker::IPCLocker":"App-Context","Plack::Handler::Standalone":"Plack","Net::DNS::RR::NSEC3PARAM":"Net-DNS","DBD::File::DataSource::Stream":"DBI","Encode::Symbol":"Encode","Pinto::PackageSpec":"Pinto","MHonArc::UTF8::CP936":"MHonArc","App::Pinto::Command":"Pinto","Apache::RegistryLoader":"mod_perl","Net::SNMP::MessageProcessing":"Net-SNMP","Lemonldap::NG::Portal::Plugins::CertificateResetByMail":"Lemonldap-NG-Portal","MIME::Body::Scalar":"MIME-tools","Image::ExifTool::LNK":"Image-ExifTool","HTML::Perlinfo::_version":"HTML-Perlinfo","Tie::Array":"perl","Net::Server::Coro":"Net-Server-Coro","Dancer::Object":"Dancer","Catalyst::Engine::HTTP::Restarter::Watcher":"Catalyst-Runtime","RPC::XML::Client":"RPC-XML","Encode::Unicode":"Encode","Net::DNS::Resolver::os390":"Net-DNS","MIME::Decoder":"MIME-tools","MojoMojo::Model::DBIC":"MojoMojo","Pod::Perldoc::ToNroff":"Pod-Perldoc","Apache::Wyrd::Cookie":"Apache-Wyrd","Spreadsheet::ParseExcel::Format":"Spreadsheet-ParseExcel","Jifty::DBI::Collection::Union":"Jifty-DBI","Tk::install":"Tk","CGI::Session::BluePrint":"CGI-Session","MojoMojo::Formatter::DocBook":"MojoMojo","Image::ExifTool::Lytro":"Image-ExifTool","Mite::Shim":"Mite","Image::ExifTool::JSON":"Image-ExifTool","Moxy":"Moxy","App::Pinto::Command::pin":"Pinto","Apache::MP3::L10N::zh_tw":"Apache-MP3","Plack::Middleware::LighttpdScriptNameFix":"Plack","Dancer::Serializer::JSON":"Dancer","Pinto::Config":"Pinto","Tk::MsgBox":"Tk","CGI::Toggle":"GBrowse","XML::LibXML::AttributeHash":"XML-LibXML","Mojo::Message::Response":"Mojolicious","Net::DNS::RR::CNAME":"Net-DNS","Galileo::DB::Deploy":"Galileo","Image::ExifTool::Lang::sv":"Image-ExifTool","MHonArc::CharEnt::KOI8_R":"MHonArc","Apache2::Filter":"mod_perl","Apache::Symbol":"mod_perl","ModPerl::ParseSource":"mod_perl","Zonemaster::Backend::Config":"Zonemaster-Backend","XML::Twig::XPath":"XML-Twig","Valiant::Util::Exception::InvalidValidatorArgs":"Valiant","Dancer2::Core::App":"Dancer2","Dpkg::Gettext":"Dpkg","SOAP::Lite::Utils":"SOAP-Lite","Bio::Graphics::Browser2::CAlign":"GBrowse","Mite::App":"Mite","Dpkg::Shlibs::Symbol":"Dpkg","Pod::Perldoc":"Pod-Perldoc","Apache::Wyrd::Interfaces::SmartInput":"Apache-Wyrd","MHonArc::CharEnt::KOI8_A":"MHonArc","Jifty::DBI::Handle::Oracle":"Jifty-DBI","Image::ExifTool::Plot":"Image-ExifTool","SOAP::Transport::LOOPBACK":"SOAP-Lite","Net::DNS::RR::CAA":"Net-DNS","Imager::Expr::Assem":"Imager","Mojo::Asset::Memory":"Mojolicious","DBD::Gofer::Transport::stream":"DBI","Image::ExifTool::SigmaRaw":"Image-ExifTool","Tk::BrowseEntry":"Tk","PApp::DataRef::Base":"PApp","Catalyst::Request::REST":"Catalyst-Action-REST","Crypt::CBC::PBKDF":"Crypt-CBC","Lemonldap::NG::Portal::Plugins::Status":"Lemonldap-NG-Portal","CPAN::Distroprefs::Result::Success":"CPAN","YAML::Type::regexp":"YAML","ExtUtils::ParseXS::Node::Param":"ExtUtils-ParseXS","Jifty::Upgrade::Internal":"Jifty","Crypt::Perl::X509::Extension::certificatePolicies":"Crypt-Perl","Net::SNMP::Transport::IPv4::UDP":"Net-SNMP","Net::Server::Proto":"Net-Server","Text::SmartyPants":"MojoMojo","Lemonldap::NG::Portal::UserDB::Custom":"Lemonldap-NG-Portal","DBD::SQLite::VirtualTable::Cursor":"DBD-SQLite","Dancer::Logger::Abstract":"Dancer","Dpkg::Shlibs::Objdump":"Dpkg","Net::LDAP::Intermediate":"perl-ldap","CGI::apacheSSI::LMOD":"CGI-apacheSSI","Moxy::Plugin::Status::401":"Moxy","Jifty::Util":"Jifty","Jifty::Action::Autocomplete":"Jifty","Moxy::Plugin::ControlPanel":"Moxy","LWP::Protocol::gopher":"libwww-perl","Data::FormValidator::ConstraintsFactory":"Data-FormValidator","Lemonldap::NG::Portal::Auth::Apache":"Lemonldap-NG-Portal","Mail::Audit::MAPS":"Mail-Audit","PApp::Prefs":"PApp","Dpkg::Source::Functions":"Dpkg","Jifty::Script::ModPerl2":"Jifty","Pinto::Action::Verify":"Pinto","Dancer::SharedData":"Dancer","MojoMojo::Schema::ResultSet::Person":"MojoMojo","Digest::base":"Digest","Net::LDAP::Intermediate::SyncInfo":"perl-ldap","Valiant::Validator::Array":"Valiant","Mojolicious::Command::generate::lite_app":"Mojolicious","Apache2::PerlSections::Dump":"mod_perl","Jifty::View::Declare":"Jifty","Mojolicious::Controller":"Mojolicious","App::Pinto::Command::revert":"Pinto","Tk::Derived":"Tk","Bio::Graphics::Browser2::Render::Slave::Status":"GBrowse","Dpkg::Arch":"Dpkg","MHonArc::UTF8::AppleHebrew":"MHonArc","DBIx::Custom::Util":"DBIx-Custom","Tk::Xlib":"Tk","IO::Socket::SSL":"IO-Socket-SSL","YAML::Error":"YAML","Tk::Dialog":"Tk","DBD::SQLite::Constants":"DBD-SQLite","DBD::Gofer::Transport::null":"DBI","Mojolicious::Command::version":"Mojolicious","Tk::Balloon":"Tk","Apache::Wyrd::Datum::Text":"Apache-Wyrd","Lemonldap::NG::Portal::Plugins::Impersonation":"Lemonldap-NG-Portal","Apache::Wyrd::Services::SAK":"Apache-Wyrd","Net::DNS::RR::L32":"Net-DNS","APR::PerlIO":"mod_perl","Kelp::Module::Config::Sandbox":"Kelp","Apache2::RequestIO":"mod_perl","Tk":"Tk","App::Genpass":"App-Genpass","Lemonldap::NG::Portal::UserDB::Demo":"Lemonldap-NG-Portal","WWW::Mechanize":"WWW-Mechanize","Mojolicious::Command::generate":"Mojolicious","Catalyst::Authentication::Store::LDAP::Backend":"Catalyst-Authentication-Store-LDAP","Apache::Wyrd::ErrTag":"Apache-Wyrd","Apache::MP3::L10N::nn":"Apache-MP3","Lemonldap::NG::Portal::Main::Display":"Lemonldap-NG-Portal","MojoMojo::Schema::Base::Result":"MojoMojo","Dancer::Timer":"Dancer","Crypt::Digest::SHA3_256":"CryptX","Tk::widgets":"Tk","App::Serializer::TextArray":"App-Context","Spoon::Formatter::Phrase":"Spoon","Zonemaster::Backend":"Zonemaster-Backend","MHonArc::UTF8::CP1253":"MHonArc","Lemonldap::NG::Portal::Auth::OpenIDConnect":"Lemonldap-NG-Portal","MySQL::Admin":"MySQL-Admin","Pinto::CommitMessage":"Pinto","App::Pinto::Command::clean":"Pinto","Crypt::Digest::SHA512_256":"CryptX","Pinto::ModlistWriter":"Pinto","Crypt::Cipher::SAFERP":"CryptX","Convert::ASN1":"Convert-ASN1","Tk::FileSelect":"Tk","CGI::Session::File":"CGI-Session","Config::Model::Backend::ShellVar":"Config-Model","Apache2::Provider":"mod_perl","SOAP::Transport::TCP::Server":"SOAP-Lite","Crypt::Checksum::CRC32":"CryptX","App::Serializer::Html":"App-Context","MojoMojo::Controller::Root":"MojoMojo","POE::Component::IRC::Plugin::Console":"POE-Component-IRC","Tk::DummyEncode":"Tk","App::Conf":"App-Context","Bio::Graphics::Browser2::GFFhelper":"GBrowse","CGI::Session::Serialize::storable":"CGI-Session","RPC::XML::Function":"RPC-XML","Apache::Wyrd::Site::NavPull":"Apache-Wyrd","Pinto::Role::Puller":"Pinto","Valiant::HTML::FormBuilder":"Valiant","Moxy::Plugin::OpenSocial":"Moxy","SOAP::Fault":"SOAP-Lite","Plack::Handler":"Plack","Net::DNS::RR::DHCID":"Net-DNS","Crypt::Random::Source::Strong::devrandom":"Crypt-Random-Source","XML::LibXML::Text":"XML-LibXML","SOAP::Server::Parameters":"SOAP-Lite","Net::DNS::RR::EUI48":"Net-DNS","Plack::App::WrapCGI":"Plack","Net::DNS::RR::OPT::CHAIN":"Net-DNS","Dpkg::Source::Package":"Dpkg","Apache::Wyrd::Services::MySQLIndex":"Apache-Wyrd","Crypt::Perl::ECDSA::EC::FieldElement":"Crypt-Perl","Apache::Include":"mod_perl","RPC::XML::boolean":"RPC-XML","CGI::Session::Example":"CGI-Session","Lemonldap::NG::Portal::Plugins::SOAPServer":"Lemonldap-NG-Portal","Dancer::Session":"Dancer","Mojolicious::Validator":"Mojolicious","Mojo::EventEmitter":"Mojolicious","Pinto::Shell":"Pinto","DBD::DBM::st":"DBI","Mite::Trait::HasDestructor":"Mite","CPAN::URL":"CPAN","I18N::Langinfo":"perl","Net::DNS::DomainName":"Net-DNS","Sub::HandlesVia::HandlerLibrary::Hash":"Sub-HandlesVia","Tk::Menu::Separator":"Tk","ExtUtils::MM_OS2":"ExtUtils-MakeMaker","Kelp::Module::Null":"Kelp","Catalyst::Action::Serialize::Callback":"Catalyst-Action-REST","for":"perl","Moxy::Plugin::Status::404":"Moxy","Crypt::Perl::ASN1::Signatures":"Crypt-Perl","UI::Dialog::Screen::Druid":"UI-Dialog","ExtUtils::MM":"ExtUtils-MakeMaker","Crypt::Digest::Keccak256":"CryptX","Dpkg::BuildTree":"Dpkg","Valiant::Validator::Scalar":"Valiant","Lemonldap::NG::Portal::Auth::Custom":"Lemonldap-NG-Portal","XML::Atom::Person":"XML-Atom","MHonArc::CharEnt::ISO8859_2":"MHonArc","Net::DNS::DomainName1035":"Net-DNS","Jifty::Plugin::Compat":"Jifty","Dpkg::Shlibs::Objdump::Object":"Dpkg","Apache::MP3::Resample":"Apache-MP3","Crypt::Perl::ECDSA::EC::CurvesDB":"Crypt-Perl","Lemonldap::NG::Portal::Plugins::AutoSignin":"Lemonldap-NG-Portal","Archive::Zip::MockFileHandle":"Archive-Zip","Mojolicious::Command::cgi":"Mojolicious","Dancer::Deprecation":"Dancer","Net::Server::INET":"Net-Server","Catalyst::Dispatcher":"Catalyst-Runtime","Crypt::Perl::X::ECDSA::NoCurveForParameters":"Crypt-Perl","ExtUtils::MakeMaker::Config":"ExtUtils-MakeMaker","POE::Filter::IRC::Compat":"POE-Component-IRC","Crypt::Digest::MD4":"CryptX","MHonArc::CharEnt::KOI_0":"MHonArc","HTTP::Session2::ClientStore":"HTTP-Session2","MHonArc::CharEnt::CP1250":"MHonArc","App::Context::POE::ClusterNode":"App-Context","DBD::SQLite::VirtualTable::PerlData":"DBD-SQLite","Jifty::DBI::Handle::ODBC":"Jifty-DBI","LWP::Protocol::ldaps":"perl-ldap","Jifty::Param::Schema":"Jifty","Module::Provision::TraitFor::UpdatingContent":"Module-Provision","Tk::InputO":"Tk","App::Pinto::Command::init":"Pinto","Tk::Listbox":"Tk","XAO::DO::Web::Condition":"XAO-Web","Crypt::Digest::BLAKE2s_160":"CryptX","AnyDBM_File":"perl","MojoMojo::Controller::PageAdmin":"MojoMojo","SOAP::Constants":"SOAP-Lite","Lemonldap::NG::Portal::Plugins::Refresh":"Lemonldap-NG-Portal","Dancer2::Core::Role::Serializer":"Dancer2","Jifty::Web::Form::Clickable":"Jifty","Apache::Session::Generate::SHA256":"Apache-Session-Browseable","DirHandle":"perl","Image::Info::WBMP":"Image-Info","DBD::Gofer::Policy::Base":"DBI","Dpkg::Vendor":"Dpkg","Mail::Mailer::smtp":"MailTools","Mojolicious::Plugin::Config":"Mojolicious","Moxy::Plugin::Scrubber":"Moxy","Apache::Wyrd::Datum::Null":"Apache-Wyrd","Elive::DAO::_Base":"Elive","Lemonldap::NG::Portal::Main::SecondFactor":"Lemonldap-NG-Portal","Net::DNS::Mailbox1035":"Net-DNS","Catalyst::Action::Serialize":"Catalyst-Action-REST","Apache::MP3::L10N::nb_no":"Apache-MP3","Mite::Compiled":"Mite","Perlbal::Plugin::Throttle::Store::Memory":"Perlbal","Dancer::Serializer::XML":"Dancer","Benchmark":"perl","Image::ExifTool::PhaseOne":"Image-ExifTool","Lemonldap::NG::Portal::UserDB::CAS":"Lemonldap-NG-Portal","Plack::TempBuffer::Auto":"Plack","XML::Atom::Category":"XML-Atom","Apache::MP3::L10N::sk":"Apache-MP3","Tk::Adjuster":"Tk","Sys::Syslog::Win32":"Sys-Syslog","Catalyst::Base":"Catalyst-Runtime","Dancer::Factory::Hook":"Dancer","Crypt::Perl::ECDSA::Utils":"Crypt-Perl","Mojolicious::Command::psgi":"Mojolicious","Crypt::Digest::RIPEMD256":"CryptX","MHonArc::UTF8::CP950":"MHonArc","Net::DNS::Resolver::MSWin32":"Net-DNS","Apache::Session::Browseable::Store::DBI":"Apache-Session-Browseable","Mysql":"DBD-mysql","Image::ExifTool::PanasonicRaw":"Image-ExifTool","Lemonldap::NG::Portal::Register::LDAP":"Lemonldap-NG-Portal","Bio::Graphics::Browser2::RemoteSet":"GBrowse","Crypt::Perl::PKCS10":"Crypt-Perl","Pinto::Initializer":"Pinto","Plack::Session":"Plack-Middleware-Session","Net::OAuth::SignatureMethod::HMAC_SHA256":"Net-OAuth","Mite::Trait::HasRoles":"Mite","Elive::Util":"Elive","SOAP::Lite::Deserializer::XMLSchemaSOAP1_1":"SOAP-Lite","Dpkg::Build::Env":"Dpkg","Sub::HandlesVia::HandlerLibrary":"Sub-HandlesVia","Crypt::Random::Source::Base::RandomDevice":"Crypt-Random-Source","Apache::ASP::CGI::Table":"Apache-ASP","Crypt::Cipher::AES":"CryptX","Jifty::Plugin::Authentication::Password::Dispatcher":"Jifty","Galileo::Admin":"Galileo","Net::IPAddress::Util":"Net-IPAddress-Util","Image::ExifTool::Lang::de":"Image-ExifTool","DBIx::Class::EncodedColumn::Crypt::Eksblowfish::Bcrypt":"DBIx-Class-EncodedColumn","WebService::Xero::Agent::PublicApplication":"WebService-Xero","MHonArc::CharEnt::GB2312":"MHonArc","Net::DNS::RR::NS":"Net-DNS","Plack::Recursive::ForwardRequest":"Plack","App::Serializer::Scalar":"App-Context","Jifty::Web::Form::Field::ResetButton":"Jifty","Lemonldap::NG::Portal::Lib::DBI":"Lemonldap-NG-Portal","DBD::SQLite::VirtualTable":"DBD-SQLite","DBIx::Class::Valiant::Validates":"Valiant","Jifty::DateTime":"Jifty","PApp::Session":"PApp","Kelp::Base":"Kelp","Crypt::Digest::BLAKE2b_160":"CryptX","Tie::Memoize":"perl","Crypt::Cipher":"CryptX","Jifty::Web::FileUpload":"Jifty","Apache::MP3::L10N::is":"Apache-MP3","BSON::XS":"BSON-XS","Parse::ePerl":"eperl","English":"perl","Jifty::Web::Form::Field::Textarea":"Jifty","Sub::HandlesVia::Toolkit::Mouse":"Sub-HandlesVia","Image::ExifTool::Apple":"Image-ExifTool","Mojolicious::Command::test":"Mojolicious","Mojolicious::Plugin::Config::Sandbox":"Mojolicious","Apache::Wyrd::Interfaces::Stealth":"Apache-Wyrd","Pinto::Schema::ResultSet::Distribution":"Pinto","App::Pinto::Command::lock":"Pinto","Net::DNS::RR::TSIG":"Net-DNS","Lemonldap::NG::Portal::2F::Register::Generic":"Lemonldap-NG-Portal","Jifty::DBI::Record::Plugin":"Jifty-DBI","Valiant::HTML::FormBuilder::RadioButton":"Valiant","ExtUtils::ParseXS::Constants":"ExtUtils-ParseXS","Imager::Font::Test":"Imager","Dpkg::Build::Info":"Dpkg","IO::Uncompress::Gunzip":"IO-Compress","Valiant::Util::Ancestors":"Valiant","SOAP::Transport::POP3":"SOAP-Lite","MARC::File::XML":"MARC-File-XML","Jifty::DBI::Filter::DateTime":"Jifty-DBI","Crypt::PK::ECC":"CryptX","Dancer2::Core::Factory":"Dancer2","MIME::Decoder::BinHex":"MIME-tools","Apache::Status":"mod_perl","Crypt::PRNG::RC4":"CryptX","CGI::Util":"CGI","Lemonldap::NG::Portal::Plugins::InitializePasswordReset":"Lemonldap-NG-Portal","Batch::Batchrun::Pwlookup":"Batch-Batchrun","Valiant::Validator::Absence":"Valiant","Lemonldap::NG::Portal::Auth::LinkedIn":"Lemonldap-NG-Portal","Crypt::Mac":"CryptX","User::pwent":"perl","Jifty::Plugin::PubSub::Connection":"Jifty","Config::Model::Node":"Config-Model","Mite::App::Command::clean":"Mite","Moxy::Plugin::ShowHTTPHeaders":"Moxy","Crypt::Perl::Ed25519":"Crypt-Perl","Net::LDAP::Util":"perl-ldap","Apache2::Status::_version":"mod_perl","Jifty::DBI::Filter::Duration":"Jifty-DBI","Legacy::Graphics::Browser::PageSettings":"GBrowse","Log::Any":"Log-Any","RPC::XML::simple_type":"RPC-XML","re":"perl","Apache2::ConnectionUtil":"mod_perl","Mojo::Cookie::Request":"Mojolicious","Apache::ReadConfig":"mod_perl","DBI::Gofer::Serializer::Storable":"DBI","Plack::Loader::Shotgun":"Plack","Bio::Graphics::Browser2::DataLoader::bigbed":"GBrowse","Apache::Table":"mod_perl","Crypt::Stream::Rabbit":"CryptX","Net::DNS::RR::MX":"Net-DNS","Dpkg::Source::Package::V1":"Dpkg","MySQL::Admin::Translate":"MySQL-Admin","PApp::Recode":"PApp","UI::Dialog::Backend::ASCII":"UI-Dialog","MySQL::Admin::Actions":"MySQL-Admin","Mail::Cap":"MailTools","HTTP::Session2":"HTTP-Session2","Bio::Graphics::Browser2::DataLoader::archive":"GBrowse","GPIB::hpe3631a":"GPIB","Mojo::JSON::Pointer":"Mojolicious","PApp::SCGI::PApp":"PApp","DBD::DBM::Table":"DBI","Valiant::HTML::Util::View":"Valiant","Config::Model::Exception::WrongValue":"Config-Model","Crypt::Perl::RNG":"Crypt-Perl","Catalyst::Engine::HTTP":"Catalyst-Runtime","Config::Model::DeprecatedHandle":"Config-Model","Image::Info::PNG":"Image-Info","Jifty::Plugin::TestServerWarnings":"Jifty","App::Documentation":"App-Context","Valiant::Filter::Flatten":"Valiant","MHonArc::UTF8::MapUTF8":"MHonArc","Log::Any::Proxy":"Log-Any","Fcntl":"perl","Lemonldap::NG::Portal::Issuer::CAS":"Lemonldap-NG-Portal","Archive::Tar::Std::_io":"Archive-Tar","Jifty::Action::Redirect":"Jifty","Net::SNMP::Transport::IPv6":"Net-SNMP","MHonArc::CharEnt::CP1251":"MHonArc","Crypt::Perl::X509::Extension::subjectInfoAccess":"Crypt-Perl","MDK::Common::Func":"MDK-Common","Jifty::Request::Fragment":"Jifty","Net::Dropbear::SSHd":"Net-Dropbear","YAML::Marshall":"YAML","Dancer::Continuation::Route::Forwarded":"Dancer","Dpkg::Shlibs":"Dpkg","Image::ExifTool::GIF":"Image-ExifTool","Sub::HandlesVia::CodeGenerator":"Sub-HandlesVia","Mite::Trait::HasMOP":"Mite","Log::Any::Proxy::WithStackTrace":"Log-Any","Mojolicious::Command::routes":"Mojolicious","Porting::updateAUTHORS":"perl","App::Serializer":"App-Context","Mojolicious::Routes::Match":"Mojolicious","Crypt::Mac::Poly1305":"CryptX","Crypt::AuthEnc::EAX":"CryptX","Jifty::DBI::Handle::Informix":"Jifty-DBI","Apache::Session::Serialize::JSON":"Apache-Session-Browseable","Valiant::Util::Exception":"Valiant","Lemonldap::NG::Portal::Lib::OIDCTokenExchange":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Plugins::PublicPages":"Lemonldap-NG-Portal","APR::Request::Apache2":"libapreq2","Catalyst::Script::CGI":"Catalyst-Runtime","Tk::Photo":"Tk","SOAP::Cloneable":"SOAP-Lite","Apache::Wyrd::Interfaces::GetUser":"Apache-Wyrd","CPAN::Author":"CPAN","Pinto::Target::Distribution":"Pinto","XML::Twig":"XML-Twig","Net::DNS::Mailbox":"Net-DNS","Image::ExifTool::CanonVRD":"Image-ExifTool","Catalyst::Exception":"Catalyst-Runtime","App::Authentication":"App-Context","RPC::XML::response":"RPC-XML","Apache::SIG":"mod_perl","Lemonldap::NG::Portal::Password::Null":"Lemonldap-NG-Portal","Crypt::Random::Source":"Crypt-Random-Source","Spreadsheet::ParseExcel::SaveParser":"Spreadsheet-ParseExcel","APR::Request::Cookie":"libapreq2","RPC::XML::array":"RPC-XML","Elive::Entity::Group":"Elive","Apache::src":"mod_perl","Jifty::Config":"Jifty","Module::Provision::TraitFor::Rendering":"Module-Provision","Lemonldap::NG::Portal::Lib::LDAP":"Lemonldap-NG-Portal","Crypt::Random::Provider::devurandom":"Crypt-Random","Valiant::Util":"Valiant","Image::ExifTool::MakerNotes":"Image-ExifTool","Perlbal::Pool":"Perlbal","Apache::MP3::L10N::pl":"Apache-MP3","Imager::Expr::Postfix":"Imager","Image::Info::AVIF":"Image-Info","Elive::Entity::MeetingParameters":"Elive","App::Pinto::Command::pull":"Pinto","RPC::XML::request":"RPC-XML","IPC::Run::Win32IO":"IPC-Run","MHonArc::UTF8::CP932":"MHonArc","UI::Dialog::Gauged":"UI-Dialog","Apache::Wyrd::Services::MetaTable":"Apache-Wyrd","Crypt::PRNG::Sober128":"CryptX","Apache2::CmdParms":"mod_perl","Net::DNS::RR::SRV":"Net-DNS","DBI::ProxyServer::db":"DBI","DBD::Proxy::RPC::PlClient":"DBI","Dancer::Logger":"Dancer","Tk::ReindexedText":"Tk","Lemonldap::NG::Portal::Plugins::BruteForceProtection":"Lemonldap-NG-Portal","Dancer2::Core::Role::Engine":"Dancer2","Catalyst::Controller::Combine":"Catalyst-Controller-Combine","Data::UUID":"Data-UUID","MySQL::Admin::Documentation":"MySQL-Admin","Dancer::MIME":"Dancer","Net::DNS::RR::ZONEMD":"Net-DNS","Catalyst::Engine::CGI":"Catalyst-Runtime","Apache::MP3::L10N::de":"Apache-MP3","Valiant::Util::Exception::UnexpectedUseModuleError":"Valiant","IO::Compress::RawDeflate":"IO-Compress","Image::ExifTool::OpenEXR":"Image-ExifTool","JPL::Class":"perl","Elive::DAO::Singleton":"Elive","Lemonldap::NG::Portal::UserDB::REST":"Lemonldap-NG-Portal","Tk::DummyEncode::iso8859_1":"Tk","DBIx::Class::Valiant::Validator::ResultSet":"Valiant","MHonArc::CharEnt::CP1258":"MHonArc","CPAN::Distroprefs::Result::Warning":"CPAN","PApp::XSLT::LibXSLT":"PApp","Crypt::Stream::RC4":"CryptX","XML::LibXML::XPathContext":"XML-LibXML","Term::ReadLine::Gnu::Var":"Term-ReadLine-Gnu","App::Authorization":"App-Context","Crypt::Perl::ECDSA::Deterministic":"Crypt-Perl","Log::Any::Adapter::File":"Log-Any","APR::Table":"mod_perl","Config::Model::SimpleUI":"Config-Model","Apache::RPC::Server":"RPC-XML","Jifty::Plugin::REST":"Jifty","DBI::DBD::Metadata":"DBI","Apache::ASP::CGI":"Apache-ASP","Net::LDAP::Control::ProxyAuth":"perl-ldap","File::DataClass::Storage":"File-DataClass","POSIX::SigSet":"perl","Perlbal::Plugin::Vhosts":"Perlbal","XML::Atom::Server":"XML-Atom","Mojolicious::Command::Author::generate::app":"Mojolicious","Jifty::Dispatcher":"Jifty","Net::Dropbox::API":"Net-Dropbox-API","PApp::Preprocessor":"PApp","UnicodeCD":"perl","DBD::SQLite::GetInfo":"DBD-SQLite","POE::Component::IRC::Plugin::BotTraffic":"POE-Component-IRC","Pinto::Util":"Pinto","Catalyst::Script::Create":"Catalyst-Runtime","HTML::EP::Session::DBI":"HTML-EP","Jifty::DBI::Filter::Boolean":"Jifty-DBI","Plack::HTTPParser":"Plack","Lemonldap::NG::Portal::Lib::OpenID::SREG":"Lemonldap-NG-Portal","PApp::XSLT::Sablotron":"PApp","Image::ExifTool::Sigma":"Image-ExifTool","Catalyst::Engine::FastCGI":"Catalyst-Runtime","Elive::Entity::Participant":"Elive","HTML::EP":"HTML-EP","Net::DNS::RR::MG":"Net-DNS","locale":"perl","Net::DNS::RR":"Net-DNS","Dancer::Continuation::Route::ErrorSent":"Dancer","Plack::Middleware::Runtime":"Plack","Tk::TextEdit":"Tk","Archive::Tar::_io":"Archive-Tar","Jifty::DBI::Collection":"Jifty-DBI","Devel::PPPort":"Devel-PPPort","IO::Compress::Adapter::Identity":"IO-Compress","Net::Server::Proto::Coro::FH":"Net-Server-Coro","CPAN::InfoObj":"CPAN","CPAN::Distribution":"CPAN","Log::Any::Adapter::Util":"Log-Any","Mail::Send":"MailTools","ModPerl::TestConfig":"mod_perl","Tk::ColorEditor":"Tk","FileCache":"perl","Mojo::Home":"Mojolicious","Lemonldap::NG::Portal::Auth::Remote":"Lemonldap-NG-Portal","Image::ExifTool::InDesign":"Image-ExifTool","YAML::Dumper::Base":"YAML","Lemonldap::NG::Portal::Main::UserDB":"Lemonldap-NG-Portal","LWP::UserAgent::AtomClient":"XML-Atom","Jifty::CurrentUser":"Jifty","Plack::Util":"Plack","Crypt::AuthEnc::CCM":"CryptX","Lemonldap::NG::Portal::2F::Mail2F":"Lemonldap-NG-Portal","Data::Entropy::Algorithms":"Data-Entropy","Tk::ReindexedROText":"Tk","Dpkg::Source::Patch":"Dpkg","Pinto::Types":"Pinto","Jifty::Plugin::Prototypism":"Jifty","XML::LibXML::SAX::AttributeNode":"XML-LibXML","GPIB":"GPIB","Batch::Batchrun::Load":"Batch-Batchrun","Jifty::View::Declare::Helpers":"Jifty","Plack::Session::Store":"Plack-Middleware-Session","Mojo::Asset":"Mojolicious","App::Pinto":"Pinto","File::DataClass::List":"File-DataClass","SOAP::Transport::HTTP::Daemon::ForkAfterProcessing":"SOAP-Lite","Sub::HandlesVia::Declare":"Sub-HandlesVia","Dpkg::BuildTypes":"Dpkg","Jifty::View::Mason::Request":"Jifty","Image::ExifTool::Lang::fi":"Image-ExifTool","VMS::Stdio":"perl","Jifty::Plugin::TestServerWarnings::View":"Jifty","DBD::SQLite::VirtualTable::FileContent":"DBD-SQLite","MHonArc::CharEnt::AppleArabic":"MHonArc","CPAN::DeferredCode":"CPAN","Image::ExifTool::KyoceraRaw":"Image-ExifTool","Apache::Session::Browseable::File":"Apache-Session-Browseable","File::DataClass::Types":"File-DataClass","Archive::Tar::Win32":"Archive-Tar","Pinto::Action::Kill":"Pinto","Mojo::Server::CGI":"Mojolicious","Kelp::Module::Config::Null":"Kelp","Jifty::DBI::Filter::YAML":"Jifty-DBI","Lemonldap::NG::Portal::Auth::LDAP":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::CertificateResetByMail::LDAP":"Lemonldap-NG-Portal","APR::Base64":"mod_perl","Apache::Wyrd::Interfaces::Dater":"Apache-Wyrd","Crypt::Perl::X509::Extension::authorityInfoAccess":"Crypt-Perl","MojoMojo::Schema::Result::WantedPage":"MojoMojo","Mojolicious::Plugin::OAuth2::Mock":"Mojolicious-Plugin-OAuth2","DBIx::Class::EncodedColumn":"DBIx-Class-EncodedColumn","Image::ExifTool::MWG":"Image-ExifTool","Archive::Tar::File":"Archive-Tar","Catalyst::Action::Serialize::View":"Catalyst-Action-REST","Encode::Internal":"Encode","UI::Dialog::GNOME":"UI-Dialog","Bio::Graphics::Browser2":"GBrowse","Plack::Request::Upload":"Plack","Net::Server::Proto::UNIXDGRAM":"Net-Server","Dancer::Route::Cache":"Dancer","Digest::SHA":"Digest-SHA","Mojolicious::Command::Author::cpanify":"Mojolicious","File::Spec::VMS":"PathTools","Tk::Text::Tag":"Tk","Elive::Entity::Participants":"Elive","Jifty::TestServer::Inline":"Jifty","App::Authentication::Htpasswd":"App-Context","Mojo::Headers":"Mojolicious","Bio::DB::Tagger":"GBrowse","ModPerl::Code":"mod_perl","Lemonldap::NG::Portal::Captcha::ReCaptcha3":"Lemonldap-NG-Portal","Image::ExifTool::APE":"Image-ExifTool","Dancer::Serializer::Dumper":"Dancer","Config::Model::Utils::GenClassPod":"Config-Model","Clipboard::Xclip":"Clipboard","ModPerl::Config":"mod_perl","Image::ExifTool::PhotoCD":"Image-ExifTool","CGI::Session::MySQL":"CGI-Session","in":"perl","Lemonldap::NG::Portal::UserDB::LDAP":"Lemonldap-NG-Portal","GitLab::API::v4::WWWClient":"GitLab-API-v4","Crypt::Perl::ASN1::Encodee":"Crypt-Perl","Crypt::Perl::X::ASN1::Find":"Crypt-Perl","Apache::Wyrd::Services::TicketPad":"Apache-Wyrd","Image::ExifTool::APP12":"Image-ExifTool","Zonemaster::Backend::Error::Conflict":"Zonemaster-Backend","Crypt::Perl::X::TooLongToSign":"Crypt-Perl","POSIX::SigAction":"perl","OS2::PrfDB::Hini":"perl","SOAP::Custom::XML::Data":"SOAP-Lite","Elive::Entity::Role":"Elive","Data::Entropy::Source":"Data-Entropy","Jifty::Action":"Jifty","Dancer2":"Dancer2","Valiant::Proxy::Hash":"Valiant","Lemonldap::NG::Portal::Main::Init":"Lemonldap-NG-Portal","MojoMojo::Declaw":"MojoMojo","WidgetDemo":"Tk","Archive::Zip::ZipFileMember":"Archive-Zip","UDDI::Constants":"SOAP-Lite","Encode::Config":"Encode","Image::ExifTool::Lang::zh_cn":"Image-ExifTool","Imager::Font":"Imager","Dpkg::BuildAPI":"Dpkg","MyFeatureFileLoader":"GBrowse","DBIx::Class::Valiant::Util::Exception::BadParameterFK":"Valiant","Valiant::Validator::Exclusion":"Valiant","Bio::Graphics::Browser2::Util":"GBrowse","Crypt::Perl::PKCS10::Attribute::challengePassword":"Crypt-Perl","XAO::DO::Web::Math":"XAO-Web","Sub::HandlesVia::Toolkit::Mouse::PackageTrait":"Sub-HandlesVia","Dpkg::File":"Dpkg","Mojo::Path":"Mojolicious","Jifty::Filter::JSON":"Jifty","Devel::PatchPerl::Plugin::Compiler":"App-perlall","SOAP::Transport::HTTP::FCGI":"SOAP-Lite","MIME::Decoder::NBit":"MIME-tools","Crypt::Perl::X::Base":"Crypt-Perl","Mojo::Util":"Mojolicious","Mojolicious::Static":"Mojolicious","XAO::DO::Web::Search":"XAO-Web","Bio::Graphics::Browser2::UserConf":"GBrowse","Jifty::DBI::Handle::mysqlPP":"Jifty-DBI","Plack::Util::Accessor":"Plack","User::grent":"perl","CGI::File::Temp":"CGI","open":"perl","Pinto::Remote":"Pinto","HTML::EP::Session":"HTML-EP","Pinto::Schema::Result::Registration":"Pinto","CGI::Session::Serialize::freezethaw":"CGI-Session","Galileo::DB::Schema":"Galileo","Catalyst::View":"Catalyst-Runtime","Valiant::Filter::Each":"Valiant","App::Context::Server":"App-Context","Crypt::Perl::ECDSA::EncodedPoint":"Crypt-Perl","diagnostics":"perl","Jifty::Upgrade":"Jifty","Mail::Internet":"MailTools","Apache::Wyrd::Input::Set":"Apache-Wyrd","Kossy::Response":"Kossy","MIME::Tools":"MIME-tools","Valiant::HTML::ContentComponent":"Valiant","Jifty::YAML":"Jifty","Crypt::Cipher::IDEA":"CryptX","DBD::Gofer::Policy::pedantic":"DBI","SVG::Sparkline::RangeArea":"SVG-Sparkline","Bio::Graphics::Browser2::DataLoader::wiggle":"GBrowse","Image::ExifTool::FITS":"Image-ExifTool","Image::ExifTool::BZZ":"Image-ExifTool","Perlbal::ClientManage":"Perlbal","Lemonldap::NG::Portal::Password::Demo":"Lemonldap-NG-Portal","MHonArc::UTF8::CP1258":"MHonArc","CPAN::Distroprefs::Pref":"CPAN","MIME::Field::ConTraEnc":"MIME-tools","GitLab::API::v4::RESTClient":"GitLab-API-v4","Apache::Wyrd::FileSize":"Apache-Wyrd","MHonArc::UTF8::MhaEncode":"MHonArc","Image::ExifTool::Rawzor":"Image-ExifTool","App::Context::POE::ClusterController":"App-Context","Mojolicious::Commands":"Mojolicious","Mite::Miteception":"Mite","Lemonldap::NG::Portal::Plugins::CheckEntropy":"Lemonldap-NG-Portal","Mojolicious::Plugin":"Mojolicious","Jifty::Plugin::LetMe::Dispatcher":"Jifty","DBD::Mem::dr":"DBI","Cmd::Dwarf":"Cmd-Dwarf","Tk::Animation":"Tk","POE::Component::IRC":"POE-Component-IRC","Crypt::Perl::X509::Extension::cRLDistributionPoints":"Crypt-Perl","Lemonldap::NG::Portal::Lib::RESTProxy":"Lemonldap-NG-Portal","Pinto::Manual::Thanks":"Pinto","SOAP::Deserializer":"SOAP-Lite","Moxy::Plugin::Status::500":"Moxy","Dancer2::Core::Dispatcher":"Dancer2","MojoMojo::Schema::Result::RolePrivilege":"MojoMojo","Net::netent":"perl","Bio::Graphics::Browser2::Render::HTML::TrackListing::Categories":"GBrowse","MHonArc::CharMaps":"MHonArc","DBD::File::DataSource::File":"DBI","Lemonldap::NG::Portal::Plugins::FindUser":"Lemonldap-NG-Portal","Plack::Util::IOWithPath":"Plack","Image::ExifTool::Parrot":"Image-ExifTool","Mojo::Collection":"Mojolicious","Apache::Wyrd::Datum":"Apache-Wyrd","Term::ReadLine::Gnu::XS":"Term-ReadLine-Gnu","Image::ExifTool::XISF":"Image-ExifTool","Dpkg::Interface::Storable":"Dpkg","Lemonldap::NG::Portal::Password::LDAP":"Lemonldap-NG-Portal","Mysql::Statement":"DBD-mysql","App::Pinto::Command::update":"Pinto","DBM_Filter::null":"perl","Bio::Graphics::Browser2::DataLoader::bam":"GBrowse","Crypt::Cipher::Skipjack":"CryptX","App::Packer::Backend::PAR":"PAR","Net::LDAP::Extra":"perl-ldap","Jifty::Handler":"Jifty","Tk::Scale":"Tk","Spoon::Formatter::Wafl":"Spoon","Net::Netmask":"Net-Netmask","Apache::Wyrd::User":"Apache-Wyrd","APR::Date":"mod_perl","Net::DNS::RR::SIG":"Net-DNS","Compress::Zlib":"IO-Compress","APR::Const":"mod_perl","Spreadsheet::ParseExcel::FmtUnicode":"Spreadsheet-ParseExcel","Crypt::PRNG::Yarrow":"CryptX","Encode::GSM0338":"Encode","Apache::ASP::GlobalASA":"Apache-ASP","MHonArc::CharEnt::AppleGreek":"MHonArc","XAO::DO::Web::Debug":"XAO-Web","WebService::Xero::Agent":"WebService-Xero","App::Pinto::Command::statistics":"Pinto","Jifty::CAS::Store::Memcached":"Jifty","File::DataClass::IO":"File-DataClass","Crypt::Perl::ECDSA::ECParameters":"Crypt-Perl","Crypt::Digest::SHA3_512":"CryptX","MHonArc::UTF8::AppleThai":"MHonArc","Net::LDAP::Control::PasswordPolicy":"perl-ldap","Pinto::Action::Add":"Pinto","Jifty::DBI::Handle":"Jifty-DBI","Crypt::Perl::X509::Extension::acmeValidation_v1":"Crypt-Perl","deprecate":"perl","Net::SNMP::Security::USM":"Net-SNMP","Bio::DB::GFF::Aggregator::match_gap":"GBrowse","Net::Server::Proto::UDP":"Net-Server","Net::LDAP::Control::VLVResponse":"perl-ldap","DBI::Gofer::Response":"DBI","Bio::Graphics::Browser2::Plugin":"GBrowse","App::ValueDomain":"App-Context","FakeHomol":"GBrowse","Pod::Perldoc::ToTerm":"Pod-Perldoc","t::Markers":"perl","Jifty::Plugin::Config::Action::AddConfig":"Jifty","CGI::Application::Dispatch::Regexp":"CGI-Application-Dispatch","Crypt::Perl::X::ECDSA::CharacteristicTwoUnsupported":"Crypt-Perl","Net::LDAP::Control::PersistentSearch":"perl-ldap","prior_to_test":"PAR","Imager::Filter::DynTest":"Imager","Kossy":"Kossy","ExtUtils::MakeMaker":"ExtUtils-MakeMaker","MHonArc::CharEnt::ISO8859_1":"MHonArc","YAML::Mo":"YAML","Jifty::Plugin::SkeletonApp::View":"Jifty","Tk::Spinbox":"Tk","Elive::DAO":"Elive","Apache::ASP::Server":"Apache-ASP","HTML::Perlinfo::General":"HTML-Perlinfo","Dancer::Logger::File":"Dancer","Lemonldap::NG::Portal::Lib::Notifications::XML":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Password::AD":"Lemonldap-NG-Portal","Config::Model::Role::Constants":"Config-Model","IO::Socket::SSL::Trace":"IO-Socket-SSL","Apache2::Status":"mod_perl","PApp::Util":"PApp","UI::Dialog::Backend::GDialog":"UI-Dialog","Apache::Session::Browseable::Store::Informix":"Apache-Session-Browseable","PAR::SetupProgname":"PAR","Lemonldap::NG::Portal::Auth::AD":"Lemonldap-NG-Portal","YAML":"YAML","Elive::Entity::Report":"Elive","Net::DNS::RR::RT":"Net-DNS","Tk::LabFrame":"Tk","Tk::DragDrop::XDNDDrop":"Tk","Spoon::Headers":"Spoon","Image::ExifTool::ZISRAW":"Image-ExifTool","Apache::ASP::CollectionItem":"Apache-ASP","Apache::Log":"mod_perl","Mojo::Message":"Mojolicious","Tk::DragDrop::SunDrop":"Tk","Lemonldap::NG::Portal::2F::UTOTP":"Lemonldap-NG-Portal","APR::URI":"mod_perl","Net::OAuth::SignatureMethod::PLAINTEXT":"Net-OAuth","Catalyst::Action::Deserialize::JSON::XS":"Catalyst-Action-REST","Dpkg::Source::Package::V2":"Dpkg","Data::Validate::IP":"Data-Validate-IP","Apache::Constants::Exports":"mod_perl","MHonArc::UTF8::AppleCyrillic":"MHonArc","Pinto::Action::Delete":"Pinto","Crypt::Cipher::SAFER_K64":"CryptX","Mail::Audit::MailInternet":"Mail-Audit","Lemonldap::NG::Portal::UserDB::SAML":"Lemonldap-NG-Portal","Data::FormValidator::Constraints::Upload":"Data-FormValidator","Bio::DB::Tagger::Tag":"GBrowse","Apache::Wyrd::Site::TagPull":"Apache-Wyrd","HTML::EP::Examples::POP3Client":"HTML-EP","Crypt::Random::Provider::File":"Crypt-Random","GitLab::API::v4::Config":"GitLab-API-v4","Apache::Wyrd::ShowParams":"Apache-Wyrd","DBD::Mem::Statement":"DBI","SimpleObjectClass":"CGI-Session","Valiant::I18N::Tag":"Valiant","Jifty::Plugin::RPC":"Jifty","EnableModule":"perl","UI::Dialog::Backend::Nautilus":"UI-Dialog","Jifty::Web::PageRegion":"Jifty","Image::ExifTool::Lang::en_gb":"Image-ExifTool","CGI::mod_perl":"mod_perl","XML::LibXML::Devel":"XML-LibXML","Catalyst::Authentication::Store::LDAP::User":"Catalyst-Authentication-Store-LDAP","Dezi":"Dezi","MHonArc::UTF8::ISO8859_8":"MHonArc","Apache::MP3::L10N::ja":"Apache-MP3","Net::Server::INET::Handle":"Net-Server","MojoMojo::Schema::ResultSet::Attachment":"MojoMojo","ModPerl::RegistryPrefork":"mod_perl","Valiant::HTML::FormBuilder::Model::TextField":"Valiant","Pinto::Remote::Result":"Pinto","Dancer::Continuation::Route::Templated":"Dancer","IO::Compress::Base::Common":"IO-Compress","Batch::Batchrun::Dbfunctions":"Batch-Batchrun","Catalyst::ClassData":"Catalyst-Runtime","RPC::XML::fault":"RPC-XML","DBI::SQL::Nano::Table_":"DBI","Image::Info":"Image-Info","Net::DNS::RR::OPT::N3U":"Net-DNS","Lemonldap::NG::Portal::Lib::2fDevices":"Lemonldap-NG-Portal","HTML::EP::EditTable":"HTML-EP","ExtUtils::MM_UWIN":"ExtUtils-MakeMaker","Imager::IO":"Imager","Catalyst::ActionChain":"Catalyst-Runtime","Spoon::Hooked":"Spoon","Crypt::Mode":"CryptX","Apache::MP3::L10N::ru":"Apache-MP3","Apache::Wyrd::DBL":"Apache-Wyrd","Dpkg::Changelog::Entry":"Dpkg","Spreadsheet::ParseExcel::Font":"Spreadsheet-ParseExcel","Valiant::Validator::Date":"Valiant","Mojo::Content":"Mojolicious","Pod::Perldoc::BaseTo":"Pod-Perldoc","LWP::Authen::Digest":"libwww-perl","MDK::Common::System":"MDK-Common","Catalyst::Exception::Interface":"Catalyst-Runtime","SOAP::Lite::Packager::DIME":"SOAP-Lite","Config::Model::Exception::UnknownId":"Config-Model","My::PersistentIterator":"SOAP-Lite","ExtUtils::MakeMaker::Locale":"ExtUtils-MakeMaker","Net::OAuth::V1_0A::UserAuthResponse":"Net-OAuth","OS2::PrfDB":"perl","Mite::App::Command::preview":"Mite","LWP":"libwww-perl","Tk::Menu":"Tk","Crypt::Perl::ECDSA":"Crypt-Perl","Module::Provision::TraitFor::PrereqDifferences":"Module-Provision","Config::Model::Exception::Formula":"Config-Model","Lemonldap::NG::Portal::Lib::SMTP":"Lemonldap-NG-Portal","Jifty::Plugin::OnlineDocs":"Jifty","Jifty::Plugin::REST::Dispatcher":"Jifty","Jifty::Plugin::Authentication::Password::Action::Login":"Jifty","Log::Any::Manager":"Log-Any","Jifty::Web::Form::Field::Upload":"Jifty","App::Context::ClusterController":"App-Context","Jifty::Web":"Jifty","Tk::Toplevel":"Tk","B::Concise":"perl","Sub::HandlesVia::HandlerLibrary::Number":"Sub-HandlesVia","App::ResourceLocker":"App-Context","Net::DNS::Packet":"Net-DNS","Lemonldap::NG::Portal::UserDB::Facebook":"Lemonldap-NG-Portal","ODBM_File":"perl","Image::ExifTool::BMP":"Image-ExifTool","ExtUtils::XSSymSet":"perl","Lemonldap::NG::Portal::Auth::Demo":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Plugins::StayConnected":"Lemonldap-NG-Portal","Image::ExifTool::HtmlDump":"Image-ExifTool","Jifty::Web::Form::Field::Checkboxes":"Jifty","Spoon::MetadataObject":"Spoon","Bio::Graphics::Browser2::Render::SnapshotManager":"GBrowse","Crypt::Mac::BLAKE2s":"CryptX","Crypt::DSA::Key::PEM":"Crypt-DSA","MHonArc::UTF8::AppleGreek":"MHonArc","Pinto::Action::Nop":"Pinto","Mojolicious::Plugin::JSONConfig":"Mojolicious","Apache::Connection":"mod_perl","GPIB::llp":"GPIB","MHonArc::UTF8::KOI8_U":"MHonArc","Valiant::HTML::Util::Collection::HashItem":"Valiant","Image::ExifTool::HP":"Image-ExifTool","Crypt::Cipher::Serpent":"CryptX","Lemonldap::NG::Portal::Auth::Slave":"Lemonldap-NG-Portal","Image::Info::BMP":"Image-Info","MHonArc::UTF8::ISO8859_1":"MHonArc","GitLab::API::v4::Mock":"GitLab-API-v4","B::Xref":"perl","Valiant::HTML::FormBuilder::Renderer::TextField":"Valiant","Tie::StdHandle":"perl","Lemonldap::NG::Portal::2F::Register::U2F":"Lemonldap-NG-Portal","Digest":"Digest","Pinto::Locator::Stratopan":"Pinto","Dpkg::Compression":"Dpkg","Jifty::LetMe":"Jifty","Perlbal::Plugin::Stats":"Perlbal","Batch::Batchrun::Mail":"Batch-Batchrun","Net::SNMP::Transport::UDP":"Net-SNMP","DBI::DBD::SqlEngine":"DBI","Config::Model::Exception::Load":"Config-Model","Time::tm":"perl","Apache::Wyrd::Form":"Apache-Wyrd","Net::DNS::RR::TLSA":"Net-DNS","Graphics::ColorNames":"Graphics-ColorNames","Image::ExifTool::Scalado":"Image-ExifTool","MHonArc::CharEnt::KOI8_E":"MHonArc","Image::ExifTool::Unknown":"Image-ExifTool","Jifty::Handle":"Jifty","Image::ExifTool::BigTIFF":"Image-ExifTool","MojoMojo::Controller::Export":"MojoMojo","Plack::Handler::HTTP::Server::PSGI":"Plack","ExtUtils::MM_BeOS":"ExtUtils-MakeMaker","ExtUtils::MM_Any":"ExtUtils-MakeMaker","Digest::MD5":"Digest-MD5","CGI::Session::Driver":"CGI-Session","Config::Model::Role::ComputeFunction":"Config-Model","Jifty::Plugin::Authentication::Password::Action::SendPasswordReminder":"Jifty","Image::ExifTool::PLIST":"Image-ExifTool","Jifty::Test":"Jifty","SSL_SSL":"IO-Socket-SSL","Image::ExifTool::NikonSettings":"Image-ExifTool","Pinto::Role::UserAgent":"Pinto","Apache2::HookRun":"mod_perl","Dpkg::BuildProfiles":"Dpkg","Crypt::Perl::X509::Extension::tlsFeature":"Crypt-Perl","Crypt::Random::Provider::rand":"Crypt-Random","Lemonldap::NG::Portal::UserDB::DBI":"Lemonldap-NG-Portal","DBIx::Custom::Result":"DBIx-Custom","Net::DNS::Resolver::android":"Net-DNS","Crypt::KeyDerivation":"CryptX","Lemonldap::NG::Portal::Plugins::History":"Lemonldap-NG-Portal","MojoMojo::Formatter::Textile":"MojoMojo","Lemonldap::NG::Portal::Plugins::ForceAuthn":"Lemonldap-NG-Portal","IO::Uncompress::Adapter::Bunzip2":"IO-Compress","Bio::Graphics::Browser2::I18n":"GBrowse","OS2::localMorphPM":"perl","LWP::Protocol::file":"libwww-perl","Dpkg::Conf":"Dpkg","DBI::Const::GetInfo::ANSI":"DBI","Valiant::HTML::BaseComponent":"Valiant","Config::Model::WarpedNode":"Config-Model","Net::DNS::RR::DNSKEY":"Net-DNS","Tk::Menu::Checkbutton":"Tk","Crypt::Digest::SHA3_224":"CryptX","Tk::Menu::Item":"Tk","SOAP::Transport::LOCAL":"SOAP-Lite","String::Compare::ConstantTime":"String-Compare-ConstantTime","Tk::LabeledEntryLabeledRadiobutton":"Tk","CPAN::Bundle":"CPAN","Plack::Middleware::Lint":"Plack","Catalyst::Helper::Controller::Combine":"Catalyst-Controller-Combine","Mojolicious::Command::prefork":"Mojolicious","Mail::Mailer::smtps":"MailTools","PApp::Admin":"PApp","Mojo::DOM::HTML":"Mojolicious","Apache::MP3":"Apache-MP3","Tk::NBFrame":"Tk","Apache::FakeRequest":"mod_perl","MySQL::Admin::Settings":"MySQL-Admin","Apache::Wyrd::Site::Pull":"Apache-Wyrd","ExtUtils::MakeMaker::version":"ExtUtils-MakeMaker","LWP::Protocol::ldap":"perl-ldap","Lemonldap::NG::Portal::Lib::Notifications::JSON":"Lemonldap-NG-Portal","CGI::Pretty":"CGI","Bio::Graphics::Browser2::OptionPick":"GBrowse","MojoMojo::Formatter::File::Image":"MojoMojo","Kelp::Module::Encoder":"Kelp","Mite::App::Command::compile":"Mite","Log::Any::Adapter::Stderr":"Log-Any","Kossy::BodyParser::MultiPart":"Kossy","Jifty::CAS::Store::Nested":"Jifty","App::Serializer::XMLSimple":"App-Context","Log::Any::Adapter::Test":"Log-Any","Bio::Graphics::Browser2::DataLoader::bigwig":"GBrowse","Bio::Graphics::Browser2::DataBase":"GBrowse","Apache::Wyrd::Datum::Char":"Apache-Wyrd","Dpkg::OpenPGP::ErrorCodes":"Dpkg","ModPerl::TiPool":"mod_perl","ExtUtils::Typemaps":"ExtUtils-ParseXS","RPC::PlClient::Comm":"PlRPC","Perlbal::Plugin::Include":"Perlbal","PAR::Packer":"PAR-Packer","Net::EasyTCP":"EasyTCP","MHonArc::UTF8::KOI_0":"MHonArc","Mojolicious::Command::Author::inflate":"Mojolicious","Net::OpenID::VerifiedIdentity":"Net-OpenID-Consumer","Apache::Wyrd::Interfaces::Mother":"Apache-Wyrd","Config::Model::BackendMgr":"Config-Model","Bio::Graphics::Browser2::PluginSet":"GBrowse","ExtUtils::Typemaps::OutputMap":"ExtUtils-ParseXS","XML::LibXML::Comment":"XML-LibXML","Image::ExifTool::DarwinCore":"Image-ExifTool","Image::ExifTool::FotoStation":"Image-ExifTool","CGI::Session::Driver::db_file":"CGI-Session","Crypt::Perl::PKCS10::Attribute":"Crypt-Perl","Image::ExifTool::Sanyo":"Image-ExifTool","DBI::Library::db":"MySQL-Admin","Lemonldap::NG::Portal::2F::WebAuthn":"Lemonldap-NG-Portal","Plack::Middleware::Auth::Basic":"Plack","Apache::Session::Browseable::PgJSON":"Apache-Session-Browseable","Plack::Middleware::StackTrace":"Plack","MHonArc::CharEnt::CP1257":"MHonArc","Mail::Audit::Util::Tempdir":"Mail-Audit","HTTP::Body::UrlEncoded":"HTTP-Body","Perlbal::Plugin::EchoService":"Perlbal","MojoMojo::Formatter::IDLink":"MojoMojo","Mojolicious::Routes::Pattern":"Mojolicious","Lemonldap::NG::Portal::Lib::OneTimeToken":"Lemonldap-NG-Portal","Jifty::Plugin::I18N::Action::SetLang":"Jifty","Perlbal::Plugin::LazyCDN":"Perlbal","Lemonldap::NG::Portal::Lib::OtherSessions":"Lemonldap-NG-Portal","Valiant::Validator::Each":"Valiant","DBI::SQL::Nano::Statement_":"DBI","Moxy::Plugin::QRCode":"Moxy","Valiant::Filter::UcFirst":"Valiant","Lemonldap::NG::Portal::2F::Ext2F":"Lemonldap-NG-Portal","MojoMojo::View::JSON":"MojoMojo","Lemonldap::NG::Portal::2F::U2F":"Lemonldap-NG-Portal","Apache2::Upload":"libapreq2","DBD::mysql":"DBD-mysql","Email::MIME::Encode":"Email-MIME","Net::DNS::RR::KX":"Net-DNS","Plack::Middleware::ErrorDocument":"Plack","DBD::File::TableSource::FileSystem":"DBI","Net::SNMP::Security":"Net-SNMP","MHonArc::CharEnt::KOI8_F":"MHonArc","XML::Twig::Entity":"XML-Twig","MDK::Common::File":"MDK-Common","Mite":"Mite","Net::Dropbear::XS::AuthState":"Net-Dropbear","FCGI":"FCGI","Crypt::Random::Source::Strong":"Crypt-Random-Source","LWP::Protocol::nogo":"libwww-perl","Jifty::Web::Form::Field::Time":"Jifty","MojoMojo::Formatter::File::DocBook":"MojoMojo","Config::Model::SearchElement":"Config-Model","Jifty::DBI::Filter::SaltHash":"Jifty-DBI","Jifty::Param":"Jifty","RPC::XML::Method":"RPC-XML","Bio::Graphics::Browser2::Render::Slave":"GBrowse","Pinto::Editor":"Pinto","Pinto::Schema::Result::Package":"Pinto","Dancer::Hook::Properties":"Dancer","Net::DNS::Domain":"Net-DNS","Devel::PatchPerl::Plugin::Asan":"App-perlall","GitLab::API::v4::Mock::Engine":"GitLab-API-v4","Crypt::Perl::Ed25519::Parse":"Crypt-Perl","Dancer2::Test":"Dancer2","IO::Socket::SSL::SSL_Context":"IO-Socket-SSL","Jifty::Script::Po":"Jifty","Net::LDAP::Control::Paged":"perl-ldap","Mojolicious::Command::get":"Mojolicious","DBI::DBD::SqlEngine::DataSource":"DBI","Image::ExifTool::Lang::ru":"Image-ExifTool","Net::DNS::RR::LP":"Net-DNS","Bundle::Image::Info::SVG":"Image-Info","SOAP::XMLSchema::Serializer":"SOAP-Lite","Config::Model::IdElementReference":"Config-Model","Net::DNS::RR::NULL":"Net-DNS","Net::DNS::RR::A":"Net-DNS","MHonArc::UTF8::AppleTurkish":"MHonArc","Mojo::HelloWorld":"Mojolicious","Spoon::Trace":"Spoon","Jifty::Result":"Jifty","Dpkg::ErrorHandling":"Dpkg","ModPerl::FunctionMap":"mod_perl","Lemonldap::NG::Portal::Plugins::RememberAuthChoice":"Lemonldap-NG-Portal","Bio::DB::SeqFeature::Store::Alias":"GBrowse","Jifty::Plugin::RequestInspector::View":"Jifty","ModPerl::TestReport":"mod_perl","DBD::File":"DBI","Lemonldap::NG::Portal::Lib::_tokenRule":"Lemonldap-NG-Portal","Zlib::OldDeflate":"IO-Compress","App::SharedDatastore":"App-Context","Elive::Entity::Preloads":"Elive","CGI::Session::ErrorHandler":"CGI-Session","Crypt::Perl::X509::Extension::subjectKeyIdentifier":"Crypt-Perl","Lemonldap::NG::Portal::Main":"Lemonldap-NG-Portal","IPC::Run::IO":"IPC-Run","Pinto::Action::Log":"Pinto","Catalyst::Exception::Base":"Catalyst-Runtime","Net::Server::Proto::Coro":"Net-Server-Coro","HTML::Parser":"HTML-Parser","Tk::Stdio::Handle":"PAR","Lemonldap::NG::Portal::Plugins::MailPasswordReset":"Lemonldap-NG-Portal","ModPerl::TestRun":"mod_perl","Valiant::Validator::Format":"Valiant","Image::ExifTool::MPF":"Image-ExifTool","Elive::Entity::ParticipantList":"Elive","Pinto::Action::Statistics":"Pinto","charnames":"perl","Perlbal::Cache":"Perlbal","Kossy::Connection":"Kossy","IO::Socket::SSL::PublicSuffix":"IO-Socket-SSL","Perlbal::Plugin::Throttle::Store::Memcached":"Perlbal","Crypt::Random::Source::Base::File":"Crypt-Random-Source","Dancer::Error":"Dancer","Dancer::Plugin":"Dancer","Net::DNS::RR::OPT":"Net-DNS","HTTP::Message::PSGI":"Plack","UI::Dialog::Console":"UI-Dialog","Mojolicious::Plugin::NotYAMLConfig":"Mojolicious","Net::SNMP::Transport::IPv4::TCP":"Net-SNMP","Data::FormValidator::Results":"Data-FormValidator","PerlIO::via":"perl","File::DataClass::Cache":"File-DataClass","Perlbal::UploadListener":"Perlbal","App::perlall":"App-perlall","Jifty::Plugin::TestServerWarnings::Appender":"Jifty","Apache2::StructureTable":"mod_perl","Net::Server::PreFork":"Net-Server","Tk::DragDrop":"Tk","Image::ExifTool::GeoTiff":"Image-ExifTool","Image::ExifTool::PLUS":"Image-ExifTool","Apache::Wyrd::Services::Tree":"Apache-Wyrd","IO::Compress":"IO-Compress","Crypt::Perl::RSA::Template":"Crypt-Perl","Apache::testold":"mod_perl","arybase":"perl","Log::Any::Adapter::Base":"Log-Any","PApp::MimeType":"PApp","DBIx::Class::Valiant::ResultSet":"Valiant","Archive::Zip::Tree":"Archive-Zip","Mojo::Server::PSGI":"Mojolicious","HTTP::Body::MultiPart":"HTTP-Body","Crypt::Digest::BLAKE2b_384":"CryptX","Perlbal::Plugin::Throttle::Store":"Perlbal","Perlbal::Plugin::Redirect":"Perlbal","Plack::Loader::Delayed":"Plack","Pinto::Action::Reset":"Pinto","Net::SSLeay::Handle":"Net-SSLeay","Dancer2::Core::Role::Template":"Dancer2","Pinto::Locator::Multiplex":"Pinto","I18N::LangTags::Detect":"perl","Locale::Maketext":"Locale-Maketext","Jifty::Plugin::CSSQuery":"Jifty","Image::ExifTool::Trailer":"Image-ExifTool","Bio::Graphics::Browser2::DataLoader":"GBrowse","Config::Model::Exception::Model":"Config-Model","Image::ExifTool::PhotoMechanic":"Image-ExifTool","Apache2::Command":"mod_perl","Dancer2::Core::Role::Hookable":"Dancer2","Pinto::Statistics":"Pinto","ExtUtils::ParseXS":"ExtUtils-ParseXS","Crypt::Perl::X509::Extension::subjectDirectoryAttributes":"Crypt-Perl","Test::Dpkg":"Dpkg","Apache::Wyrd::Site::Login":"Apache-Wyrd","Net::DNS::RR::PX":"Net-DNS","OS2::REXX":"perl","utf8":"perl","Pinto::Remote::Action":"Pinto","Image::ExifTool::Lang::es":"Image-ExifTool","Apache::MP3::L10N::no_no":"Apache-MP3","Config::Model::ValueComputer":"Config-Model","Pinto::Schema::ResultSet::Package":"Pinto","DBD::Proxy::dr":"DBI","Log::Any::Adapter":"Log-Any","Net::DNS::RR::EUI64":"Net-DNS","Template::Declare::Exception":"Jifty","Lemonldap::NG::Portal::Auth::SAML":"Lemonldap-NG-Portal","Dpkg::Source::Package::V3::Bzr":"Dpkg","MojoMojo::Controller::Image":"MojoMojo","XML::Atom::Feed":"XML-Atom","Perlbal::Util":"Perlbal","RPC::XML::ParserFactory":"RPC-XML","Tk::DirTreeDialog":"Tk","Jifty::View::Declare::CoreTemplates":"Jifty","RPC::XML":"RPC-XML","Elive::Entity::Meeting":"Elive","CPAN::FTP":"CPAN","Catalyst::Script::FastCGI":"Catalyst-Runtime","Jifty::I18N":"Jifty","GDBM_File":"perl","Net::DNS::RR::TKEY":"Net-DNS","Net::OAuth::V1_0A::RequestTokenResponse":"Net-OAuth","Jifty::Web::Form::Field::InlineButton":"Jifty","SOAP::Lite::Deserializer::XMLSchemaSOAP1_2":"SOAP-Lite","Apache::MP3::L10N::fr":"Apache-MP3","Jifty::I18N::en":"Jifty","CryptX":"CryptX","Jifty::DBI::Filter::Date":"Jifty-DBI","App::ResourceLocker::IPCSemaphore":"App-Context","Image::ExifTool::Vorbis":"Image-ExifTool","Mojo::UserAgent::Proxy":"Mojolicious","DBI::DBD::SqlEngine::TableSource":"DBI","Encode":"Encode","Apache::ASP::State":"Apache-ASP","Net::DNS::RR::MR":"Net-DNS","PApp::HTML":"PApp","Plack::Middleware::Session":"Plack-Middleware-Session","CPAN":"CPAN","Email::MIME::Modifier":"Email-MIME","Config::Model::ObjTreeScanner":"Config-Model","Mite::Trait::HasConstructor":"Mite","HTML::Editor::Markdown":"MySQL-Admin","File::Basename":"perl","Apache::MP3::L10N::cs":"Apache-MP3","Bio::Graphics::GBrowseFeature":"GBrowse","Net::LDAP::Control::SyncDone":"perl-ldap","Mite::Trait::HasMethods":"Mite","Crypt::Cipher::Noekeon":"CryptX","Crypt::Perl::RSA::PrivateKey":"Crypt-Perl","DBI::DBD::SqlEngine::st":"DBI","File::RandomAccess":"Image-ExifTool","Valiant::Validator::Hash":"Valiant","Crypt::DSA::KeyChain":"Crypt-DSA","App::Pinto::Command::register":"Pinto","Apache2::Module":"mod_perl","UI::Dialog::Backend::XOSD":"UI-Dialog","CGI::Session::Test::Default":"CGI-Session","Bio::Graphics::Browser2::Render::TrackConfig":"GBrowse","SOAP::Lite::Packager":"SOAP-Lite","MojoMojo::Schema::Result::Page":"MojoMojo","MojoMojo::Formatter::Pod::Simple::HTML":"MojoMojo","Pinto::Role::PauseConfig":"Pinto","Crypt::Perl::X::Generic":"Crypt-Perl","Tk::X":"Tk","Mojo::IOLoop::Server":"Mojolicious","App::Pinto::Command::stacks":"Pinto","Elive::Util::Type":"Elive","Apache::Session::Browseable::Redis":"Apache-Session-Browseable","Image::ExifTool::MPC":"Image-ExifTool","Image::ExifTool::Protobuf":"Image-ExifTool","RPC::XML::Parser::XMLLibXML":"RPC-XML","Net::LDAP::Control::PostRead":"perl-ldap","Apache::ASP::Application":"Apache-ASP","MyTestModule":"perl","Crypt::Perl::X509::Extension::ct_precert_scts":"Crypt-Perl","App::Pinto::Command::help":"Pinto","Plack::Handler::Apache2":"Plack","Net::Server::Proto::TCP":"Net-Server","MIME::Body":"MIME-tools","Apache::MP3::L10N::en":"Apache-MP3","Crypt::DSA::Signature":"Crypt-DSA","OverloadedObjectClass":"CGI-Session","UI::Dialog::Screen::Menu":"UI-Dialog","ExtUtils::Miniperl":"perl","CBC":"Crypt-CBC","Image::Info::JPEG":"Image-Info","Jifty::Action::Record::Execute":"Jifty","Perlbal::HTTPHeaders":"Perlbal","IO::Compress::Gzip::Constants":"IO-Compress","LWP::Protocol::data":"libwww-perl","pp":"PAR-Packer","Net::LDAP::Control::NoOp":"perl-ldap","Dancer::Session::Abstract":"Dancer","Apache":"mod_perl","Jifty::Plugin::SinglePage":"Jifty","Archive::Zip":"Archive-Zip","Dpkg::Deps::KnownFacts":"Dpkg","Jifty::Plugin::SkeletonApp":"Jifty","GPIB::hp33120a":"GPIB","Lemonldap::NG::Portal::Issuer::SAML":"Lemonldap-NG-Portal","Digest::file":"Digest","Spoon::Formatter::Block":"Spoon","MojoMojo::Formatter::Main":"MojoMojo","APR::SockAddr":"mod_perl","YAML::XS":"YAML-LibYAML","Jifty::Plugin::ErrorTemplates::View":"Jifty","XML::Atom::Link":"XML-Atom","Apache::Session::Browseable::SQLite":"Apache-Session-Browseable","Imager::Font::Type1":"Imager","XAO::DO::Web::FS":"XAO-Web","Dpkg::Shlibs::SymbolFile":"Dpkg","Zonemaster::Backend::DB::MySQL":"Zonemaster-Backend","Image::ExifTool::RTF":"Image-ExifTool","Net::DNS::RR::OPT::DHU":"Net-DNS","DBD::NullP::db":"DBI","Catalyst::Script::Test":"Catalyst-Runtime","App::CallDispatcher":"App-Context","Tk::ItemStyle":"Tk","Crypt::Mac::HMAC":"CryptX","ModPerl::PerlRunPrefork":"mod_perl","Net::DNS::RR::MB":"Net-DNS","Lemonldap::NG::Portal::Lib::Code2F":"Lemonldap-NG-Portal","Net::OAuth::AccessTokenRequest":"Net-OAuth","IO::Socket::SSL::Intercept":"IO-Socket-SSL","Image::Info::XBM":"Image-Info","Image::ExifTool::Casio":"Image-ExifTool","Lemonldap::NG::Portal::Plugins::CheckState":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Main::Menu":"Lemonldap-NG-Portal","Dancer::Engine":"Dancer","Mojo::Server::Morbo::Backend::Poll":"Mojolicious","Net::Server::TiedHandle":"Net-Server","SVG::Sparkline":"SVG-Sparkline","I18N::LangTags::List":"perl","MojoMojo::Controller::Attachment":"MojoMojo","Term::ReadLine::Gnu::AU":"Term-ReadLine-Gnu","LWP::Protocol::mailto":"libwww-perl","DBD::mysql::GetInfo":"DBD-mysql","Dancer::Exceptions":"Dancer","Apache::Resource":"mod_perl","Lemonldap::NG::Portal::Main::Issuer":"Lemonldap-NG-Portal","MojoMojo::Formatter::Amazon":"MojoMojo","Crypt::Perl::X509::Extension::basicConstraints":"Crypt-Perl","Dpkg::Deps::OR":"Dpkg","CPAN::LWP::UserAgent":"CPAN","Apache::XAO":"XAO-Web","Zonemaster::Backend::DB::SQLite":"Zonemaster-Backend","App::Pinto::Command::new":"Pinto","Net::LDAP::LDIF":"perl-ldap","Crypt::CBC::PBKDF::none":"Crypt-CBC","Catalyst::ActionContainer":"Catalyst-Runtime","back_tick_a_command":"PAR","Dancer2::Logger::Note":"Dancer2","Dpkg::Exit":"Dpkg","Kelp::Less":"Kelp","Net::LDAP::FilterMatch":"perl-ldap","Catalyst::Component":"Catalyst-Runtime","DBI::Gofer::Transport::pipeone":"DBI","Image::ExifTool::DJI":"Image-ExifTool","Dpkg::Changelog":"Dpkg","Jifty::Web::Form::Field::OrderedList":"Jifty","SOAP::Transport":"SOAP-Lite","MojoMojo::View::TT":"MojoMojo","File::DataClass::Schema":"File-DataClass","MojoMojo::Formatter::IRCLog":"MojoMojo","Spoon::Template":"Spoon","Jifty::View::Mason::Handler":"Jifty","Dpkg::Version":"Dpkg","HTML::Perlinfo":"HTML-Perlinfo","Jifty::Record":"Jifty","Catalyst::TraitFor::Request::REST::ForBrowsers":"Catalyst-Action-REST","MHonArc::CharEnt::BIG5_ETEN":"MHonArc","Dancer2::Core":"Dancer2","Net::DNS::Text":"Net-DNS","Apache::Wyrd::Input::Opt":"Apache-Wyrd","Apache::Session::Browseable":"Apache-Session-Browseable","Net::DNS::RR::AFSDB":"Net-DNS","Lemonldap::NG::Portal::Lib::Net::LDAP":"Lemonldap-NG-Portal","attributes":"perl","Plack::Handler::FCGI":"Plack","SOAP::Transport::HTTP":"SOAP-Lite","Crypt::Cipher::DES_EDE":"CryptX","Plack::Server::FCGI":"Plack","Pinto::Action::Copy":"Pinto","UI::Dialog":"UI-Dialog","MojoMojo::Schema::ResultSet::Page":"MojoMojo","Dpkg::Index":"Dpkg","Config::Model::Exception::ModelDeclaration":"Config-Model","Clipboard::MacPasteboard":"Clipboard","Dancer::Continuation::Route::Passed":"Dancer","Valiant::Validator::Check":"Valiant","Pod::Perldoc::ToPod":"Pod-Perldoc","Zonemaster::Backend::Error":"Zonemaster-Backend","YAML::Tag":"YAML","MHonArc::UTF8::ISO8859_7":"MHonArc","Image::ExifTool::Panasonic":"Image-ExifTool","Dancer::Template::Simple":"Dancer","Lemonldap::NG::Portal::Register::AD":"Lemonldap-NG-Portal","Net::DNS::Resolver":"Net-DNS","Valiant::Filter":"Valiant","MojoMojo::Formatter::File::Text":"MojoMojo","HTML::Perlinfo::Common":"HTML-Perlinfo","Spoon::Hook":"Spoon","Compress::Raw::Bunzip2":"Compress-Raw-Bzip2","Kelp::Module":"Kelp","Plack::Session::Store::DBI":"Plack-Middleware-Session","Image::ExifTool::PDF":"Image-ExifTool","MojoMojo::Schema":"MojoMojo","Apache2::ParseSource::Scan":"mod_perl","File::Path":"File-Path","Crypt::Perl::RSA::Parse":"Crypt-Perl","Opcode":"perl","Config::Model::HashId":"Config-Model","DBD::ExampleP":"DBI","Config::Model::Dumper":"Config-Model","CPAN::HandleConfig":"CPAN","Image::ExifTool::Lang::en_ca":"Image-ExifTool","Net::DNS::RR::SVCB":"Net-DNS","Mojolicious::Plugin::EPRenderer":"Mojolicious","Safe":"Safe","XML::Atom::ErrorHandler":"XML-Atom","Config::Model::Loader":"Config-Model","ModPerl::FunctionTable":"mod_perl","APR::Status":"mod_perl","PApp::Application":"PApp","MojoMojo::Formatter::Defang":"MojoMojo","Kelp::Routes":"Kelp","Mojo::Server::Prefork":"Mojolicious","Lemonldap::NG::Portal::UserDB::Proxy":"Lemonldap-NG-Portal","Apache::Wyrd::BrowserSwitch":"Apache-Wyrd","CGI::Application::Plugin::RunmodeDeclare":"CGI-Application-Plugin-RunmodeDeclare","App::Session":"App-Context","Dancer::Logger::Console":"Dancer","RPC::XML::Parser::XMLParser":"RPC-XML","Lemonldap::NG::Portal::Lib::Radius":"Lemonldap-NG-Portal","Moxy::Plugin::UserID":"Moxy","Apache::MP3::L10N::ko":"Apache-MP3","Catalyst::DispatchType::Chained":"Catalyst-Runtime","DBI::Library::Database":"MySQL-Admin","Image::ExifTool::ITC":"Image-ExifTool","Net::LDAP::DSML::pp":"perl-ldap","File::Slurp":"File-Slurp","IPTables::Parse":"IPTables-Parse","Apache::Wyrd::Services::PreAuth":"Apache-Wyrd","Imager::Color::Float":"Imager","Module::Load::Conditional":"Module-Load-Conditional","ModPerl::MethodLookup":"mod_perl","Config::Model::Role::Utils":"Config-Model","Jifty::Web::Form::Field::Unrendered":"Jifty","PApp::XPCSE":"PApp","Lemonldap::NG::Portal::Register::Custom":"Lemonldap-NG-Portal","Crypt::Perl::X509v3":"Crypt-Perl","DBD::Gofer::dr":"DBI","IO::Uncompress::Inflate":"IO-Compress","Tk::DragDrop::SunSite":"Tk","Mojolicious::Renderer":"Mojolicious","Jifty::Script::App":"Jifty","XAO::DO::Web::Date":"XAO-Web","Dancer2::Logger::File":"Dancer2","Perlbal::Plugin::Stats::Storage":"Perlbal","LRUCache":"GBrowse","MHonArc::UTF8::ISO8859_13":"MHonArc","Image::ExifTool::AFCP":"Image-ExifTool","Apache::MP3::Sorted":"Apache-MP3","Spoon::Config":"Spoon","Kelp::Module::Logger":"Kelp","HTML::Editor":"MySQL-Admin","Net::Server::Multiplex":"Net-Server","Mite::Package":"Mite","XML::Atom::Base":"XML-Atom","Net::SNMP::Transport::IPv6::TCP":"Net-SNMP","XAO::DO::Web::Page":"XAO-Web","GD::Simple":"GD","PApp::Application::Agni":"PApp","Crypt::CBC::PBKDF::opensslv1":"Crypt-CBC","CGI::apacheSSI::Gmt":"CGI-apacheSSI","Perlbal::Test::WebServer":"Perlbal","Dancer::Plugin::Ajax":"Dancer","Pinto::Constants":"Pinto","Zonemaster::Backend::TestAgent":"Zonemaster-Backend","Crypt::Perl::ECDSA::Generate":"Crypt-Perl","Image::ExifTool::GPS":"Image-ExifTool","Jifty::Plugin::Halo::Mason":"Jifty","Jifty::Script::Env":"Jifty","Catalyst::Action::REST":"Catalyst-Action-REST","Apache::Session::Browseable::Informix":"Apache-Session-Browseable","Net::LDAP::Control::PreRead":"perl-ldap","ExtUtils::Command::MM":"ExtUtils-MakeMaker","MojoMojo::Formatter::File::Test":"MojoMojo","Image::ExifTool::AIFF":"Image-ExifTool","XML::LibXML::RegExp":"XML-LibXML","Module::Signature":"Module-Signature","PApp::User":"PApp","Crypt::Digest::SHA3_384":"CryptX","Mite::Signature":"Mite","Sys::Syslog":"Sys-Syslog","Apache::MP3::L10N::fi":"Apache-MP3","Lemonldap::NG::Portal::Auth::Combination":"Lemonldap-NG-Portal","Crypt::Perl::X509::Name":"Crypt-Perl","Dancer::App":"Dancer","ModPerl::RegistryLoader":"mod_perl","Dpkg::Control::FieldsCore":"Dpkg","Tk::TList":"Tk","Plack::Util::Prototype":"Plack","Spoon::CGI":"Spoon","MHonArc::CharEnt::EUC_JP":"MHonArc","Valiant::Util::Exception::Strict":"Valiant","Dancer2::Core::Role::Logger":"Dancer2","Net::DNS::RR::NSEC3":"Net-DNS","Net::DNS":"Net-DNS","Pod::Html":"perl","Apache::SessionX::Store::File":"Apache-SessionX","ExtUtils::testlib":"ExtUtils-MakeMaker","Tk::HList":"Tk","GitLab::API::v4":"GitLab-API-v4","Plack::Middleware::ContentLength":"Plack","GPIB::hp59306a":"GPIB","Bio::Graphics::Browser2::Action":"GBrowse","Lemonldap::NG::Portal::UserDB::OpenID":"Lemonldap-NG-Portal","APR::XSLoader":"mod_perl","Pinto::Result":"Pinto","Dancer2::Core::MIME":"Dancer2","Image::ExifTool::Microsoft":"Image-ExifTool","MIME::Entity":"MIME-tools","Moxy::Plugin::GPS::ThirdForce":"Moxy","HTML::EP::Examples::Glimpse":"HTML-EP","Net::Ping::External":"Net-Ping-External","CGI::Carp":"CGI","Spreadsheet::ParseExcel::Cell":"Spreadsheet-ParseExcel","MojoMojo::Formatter::Redirect":"MojoMojo","WebService::Xero::Invoice":"WebService-Xero","MojoMojo::Schema::Result::Role":"MojoMojo","Config::Model::Backend::Json":"Config-Model","GitLab::API::v4::Constants":"GitLab-API-v4","Image::ExifTool::WPG":"Image-ExifTool","Net::DNS::RR::URI":"Net-DNS","Imager::Font::BBox":"Imager","Apache2::SubProcess":"mod_perl","DBI::DBD::SqlEngine::dr":"DBI","Mail::Mailer::rfc822":"MailTools","Pinto::Role::FileFetcher":"Pinto","RPC::XML::datetime_iso8601":"RPC-XML","Mite::Trait::HasAttributes":"Mite","Tk::Checkbutton":"Tk","Image::ExifTool::InfiRay":"Image-ExifTool","CPAN::Module":"CPAN","Net::CIDR::Lite::Span":"Net-CIDR-Lite","POE::Component::IRC::Plugin::BotAddressed":"POE-Component-IRC","Image::ExifTool::CanonRaw":"Image-ExifTool","App::Context::HTTP":"App-Context","Mojo::Server":"Mojolicious","XML::LibXML::_SAXParser":"XML-LibXML","XAO::DO::Web::Styler":"XAO-Web","Axis":"perl","Crypt::Digest::Keccak224":"CryptX","Lemonldap::NG::Portal::2F::Radius":"Lemonldap-NG-Portal","CPAN::Complete":"CPAN","Net::SNMP::Transport::TCP6":"Net-SNMP","MojoMojo::Formatter::Dir":"MojoMojo","Net::SNMP::Transport::IPv4":"Net-SNMP","Image::ExifTool::ZIP":"Image-ExifTool","Plack::Middleware::JSONP":"Plack","CPAN::Distroprefs::Result":"CPAN","Net::LDAP::Extra::eDirectory":"perl-ldap","Sub::HandlesVia::HandlerLibrary::Bool":"Sub-HandlesVia","MHonArc::UTF8::ISO8859_14":"MHonArc","Apache::Session::Browseable::Store::Sybase":"Apache-Session-Browseable","Net::DNS::Parameters":"Net-DNS","Alien::PCRE2":"Alien-PCRE2","MojoMojo::Formatter::YouTube":"MojoMojo","MIME::Decoder::Gzip64":"MIME-tools","CPAN::Exception::yaml_process_error":"CPAN","Crypt::Random::Source::Base":"Crypt-Random-Source","MHonArc::CharEnt::ISO8859_9":"MHonArc","RPC::XML::string":"RPC-XML","Catalyst::Runtime":"Catalyst-Runtime","Jifty::Plugin::RequestInspector::Model::Request":"Jifty","Jifty::Web::Form":"Jifty","File::Copy":"perl","Pinto::Schema::Result::Prerequisite":"Pinto","MojoMojo::Formatter::Wiki":"MojoMojo","MIME::Field::ContType":"MIME-tools","Apache::Session::Browseable::MySQLJSON":"Apache-Session-Browseable","Mojo::DOM::CSS":"Mojolicious","Sub::HandlesVia":"Sub-HandlesVia","Kossy::BodyParser::OctetStream":"Kossy","Jifty::View::Declare::CRUD":"Jifty","YAML::XS::LibYAML":"YAML-LibYAML","Catalyst::Utils":"Catalyst-Runtime","Catalyst::DispatchType::Default":"Catalyst-Runtime","Net::OAuth::AccessToken":"Net-OAuth","yaml_sequence":"YAML","Clipboard":"Clipboard","OptreeCheck":"perl","Perlbal::Plugin::NotModified":"Perlbal","PerlIO::mmap":"perl","Encode::JP":"Encode","DBD::Gofer::Transport::corostream":"DBI","Plack::MIME":"Plack","Apache::Wyrd::MySQLForm":"Apache-Wyrd","Catalyst::Engine::HTTP::Restarter":"Catalyst-Runtime","MojoMojo::Controller::Tag":"MojoMojo","Crypt::Digest::SHA1":"CryptX","Pinto::Migrator":"Pinto","Sub::HandlesVia::Mite":"Sub-HandlesVia","Haiku":"perl","RPC::PlServer::Comm":"PlRPC","Plack::Middleware::SimpleLogger":"Plack","Dpkg::BuildEnv":"Dpkg","Mojo::Collection::Role::Extra":"Mojo-DOM-Role-Analyzer","Lemonldap::NG::Portal::UserDB::Choice":"Lemonldap-NG-Portal","Mojolicious::Plugins":"Mojolicious","Crypt::Perl::ASN1":"Crypt-Perl","ExtUtils::Command":"ExtUtils-MakeMaker","Jifty::Test::WWW::Selenium":"Jifty","Kelp::Routes::Location":"Kelp","Crypt::Perl::ECDSA::Parse":"Crypt-Perl","Lemonldap::NG::Portal::Lib::REST":"Lemonldap-NG-Portal","SOAP::Trace":"SOAP-Lite","MHonArc::UTF8::CP1257":"MHonArc","APR::UUID":"mod_perl","Hash::Util":"perl","B::Deparse":"perl","Plack::Test":"Plack","Lemonldap::NG::Portal::Lib::Captcha":"Lemonldap-NG-Portal","Net::DNS::RR::OPT::EXTENDED_ERROR":"Net-DNS","Apache2::SourceTables":"mod_perl","Spreadsheet::ParseExcel::Dump":"Spreadsheet-ParseExcel","DBI::ProfileData":"DBI","IO::Socket::SSL::Utils":"IO-Socket-SSL","MHonArc::CharEnt::ISO8859_4":"MHonArc","Plack::App::URLMap":"Plack","Tk::WinPhoto":"Tk","Apache::Wyrd::Datum::Integer":"Apache-Wyrd","XML::LibXML::NodeList":"XML-LibXML","Image::Info::Result":"Image-Info","App::Pinto::Command::diff":"Pinto","Image::ExifTool::MinoltaRaw":"Image-ExifTool","Image::ExifTool::Nintendo":"Image-ExifTool","Pinto::Remote::Action::Add":"Pinto","Net::DNS::Resolver::os2":"Net-DNS","Jifty::Module::Pluggable":"Jifty","App::Pinto::Command::log":"Pinto","Kelp::Middleware":"Kelp","Jifty::Test::WWW::Declare":"Jifty","Galileo::Plugin::Modal":"Galileo","Plack::Test::Suite":"Plack","Net::DNS::Resolver::cygwin":"Net-DNS","Jifty::Web::Form::Field::Hidden":"Jifty","POSIX::SigRt":"perl","Bio::Graphics::Karyotype":"GBrowse","SOAP::Data":"SOAP-Lite","HTTP::Server::PSGI":"Plack","Mojolicious::Command::Author::generate::dockerfile":"Mojolicious","Dpkg::Checksums":"Dpkg","Jifty::Server::Prefork":"Jifty","SOAP::Server":"SOAP-Lite","DBIx::Class::Valiant::Validator::SetSize":"Valiant","Bundle::Apache":"mod_perl","Net::DNS::RR::OPT::TCP_KEEPALIVE":"Net-DNS","XML::Twig::XPath::Elt":"XML-Twig","ExtUtils::MM_Win95":"ExtUtils-MakeMaker","Pinto::Remote::Action::Install":"Pinto","Imager::Fill":"Imager","MHonArc::CharEnt::CP1256":"MHonArc","vmsish":"perl","Pinto::Locker":"Pinto","Image::ExifTool::GE":"Image-ExifTool","Kelp":"Kelp","Jifty::Web::Form::Field":"Jifty","Archive::Zip::Archive":"Archive-Zip","Apache::Wyrd::Services::Key":"Apache-Wyrd","Dancer2::Core::Cookie":"Dancer2","DBI::Gofer::Serializer::Base":"DBI","XML::LibXML::SAX::Builder":"XML-LibXML","Perlbal::Plugin::AccessControl":"Perlbal","Bio::DB::SeqFeature::Store::Alias::Iterator":"GBrowse","File::Compare":"perl","Dancer::Hook":"Dancer","Image::ExifTool::PCX":"Image-ExifTool","Kossy::Request":"Kossy","MDK::Common::Math":"MDK-Common","POE::Component::IRC::Plugin::CTCP":"POE-Component-IRC","DBI::FAQ":"DBI","Net::Server::PreForkSimple":"Net-Server","Net::LDAP::Entry":"perl-ldap","Web::API":"Web-API","Dancer2::Core::Response":"Dancer2","X509_Certificate":"IO-Socket-SSL","Jifty::DBI::Handle::SQLite":"Jifty-DBI","ExtUtils::Liblist::Kid":"ExtUtils-MakeMaker","Tie::Hash::NamedCapture":"perl","UI::Dialog::Backend::Zenity":"UI-Dialog","DBIx::Custom::Mapper":"DBIx-Custom","Bio::Graphics::Browser2::AuthorizedFeatureFile":"GBrowse","POE::Component::IRC::Plugin":"POE-Component-IRC","Net::LDAP::Control::Assertion":"perl-ldap","Catalyst::Plugin::Static::Simple":"Catalyst-Plugin-Static-Simple","CPAN::Plugin::Specfile":"CPAN","Valiant::Util::Exception::MissingMethod":"Valiant","Jifty::Plugin::Deflater":"Jifty","PApp::Config":"PApp","Apache::MP3::Playlist":"Apache-MP3","Jifty::DBI::Filter::base64":"Jifty-DBI","WebService::Xero::Agent::PrivateApplication":"WebService-Xero","Mite::App::Command::init":"Mite","HTML::EP::Shop":"HTML-EP","Net::DNS::Resolver::Base":"Net-DNS","Jifty::DBI::Handle::mysql":"Jifty-DBI","Lemonldap::NG::Portal::Plugins::OIDCInternalTokenExchange":"Lemonldap-NG-Portal","Zonemaster::Backend::DB":"Zonemaster-Backend","DBD::Gofer::st":"DBI","Image::ExifTool::iWork":"Image-ExifTool","Mail::Util":"MailTools","Apache::Wyrd::Services::SearchParser":"Apache-Wyrd","Lemonldap::NG::Portal::CertificateResetByMail::Custom":"Lemonldap-NG-Portal","Crypt::Perl::Math":"Crypt-Perl","Image::ExifTool::Validate":"Image-ExifTool","Apache::MP3::L10N::sh":"Apache-MP3","HTTP::Session2::ClientStore2":"HTTP-Session2","Crypt::Mac::XCBC":"CryptX","ExtUtils::Liblist":"ExtUtils-MakeMaker","MHonArc::CharEnt":"MHonArc","HTML::TokeParser":"HTML-Parser","Tk::JPEG":"Tk","Spreadsheet::ParseExcel::Workbook":"Spreadsheet-ParseExcel","Plack::Middleware::RearrangeHeaders":"Plack","XML::LibXML::DocumentFragment":"XML-LibXML","App::Context::ClusterNode":"App-Context","JNI":"perl","Net::LDAP::Extra::AD":"perl-ldap","Apache::Wyrd::Input::Condenser":"Apache-Wyrd","Jifty::DBI::Filter::Storable":"Jifty-DBI","DBI::DBD::SqlEngine::Statement":"DBI","Mojolicious":"Mojolicious","Pinto::ArchiveUnpacker":"Pinto","MHonArc::CharEnt::KOI8_U":"MHonArc","Sub::HandlesVia::Toolkit::Moose":"Sub-HandlesVia","Archive::Zip::FileMember":"Archive-Zip","Apache::Wyrd::Input::Complex":"Apache-Wyrd","Perlbal::SocketSSL":"Perlbal","HTML::LinkExtor":"HTML-Parser","DBD::mysql::db":"DBD-mysql","DBD::mysqlPP::dr":"DBD-mysqlPP","Jifty::Plugin::Compat::CGI":"Jifty","PApp::SCGI":"PApp","Tk::DragDrop::SunConst":"Tk","Jifty::Plugin::Config::Action::Restart":"Jifty","Proc::Killfam":"Proc-ProcessTable","Apache2::XSLoader":"mod_perl","Lemonldap::NG::Portal::Plugins::PublicNotifications":"Lemonldap-NG-Portal","App::Pinto::Command::roots":"Pinto","PApp::FormBuffer":"PApp","DBD::Gofer::Transport::Base":"DBI","SOAP::Test::Server":"SOAP-Lite","XAO::DO::Web::Redirect":"XAO-Web","Dpkg::IPC":"Dpkg","MHonArc::CharEnt::AppleRoman":"MHonArc","Mojo::Template":"Mojolicious","UI::Dialog::Backend::CDialog":"UI-Dialog","IO::Socket::SSL::SSL_HANDLE":"IO-Socket-SSL","RPC::XML::Server":"RPC-XML","Dancer::Serializer":"Dancer","Catalyst::Action::Deserialize::YAML":"Catalyst-Action-REST","LWP::Debug::TraceHTTP":"libwww-perl","Plack::TempBuffer":"Plack","Image::TIFF::Rational":"Image-Info","Config::Model::BackendTrackOrder":"Config-Model","Mail::Audit":"Mail-Audit","Crypt::Perl::X::ECDSA::NoCurveForName":"Crypt-Perl","Plack::Middleware::AccessLog":"Plack","Net::OAuth::V1_0A::RequestTokenRequest":"Net-OAuth","CGI::Session::ID::static":"CGI-Session","site":"Apache-ASP","Apache2::Cookie":"libapreq2","Crypt::AuthEnc::GCM":"CryptX","Encode::JP::H2Z":"Encode","XML::Twig::Elt":"XML-Twig","MIME::Body::InCore":"MIME-tools","Imager":"Imager","Apache::MP3::L10N::RightToLeft":"Apache-MP3","Image::ExifTool::LigoGPS":"Image-ExifTool","Term::ReadLine::Gnu":"Term-ReadLine-Gnu","DBI::Gofer::Transport::stream":"DBI","Dpkg::Source::Format":"Dpkg","Dancer::GetOpt":"Dancer","DBI::Library::Database::st":"MySQL-Admin","Apache::Wyrd::Loop":"Apache-Wyrd","Apache2::Resource":"mod_perl","Sub::HandlesVia::HandlerLibrary::Enum":"Sub-HandlesVia","Jifty::Plugin::PubSub::Bus":"Jifty","Crypt::Stream::Sosemanuk":"CryptX","App::Context::POE":"App-Context","Net::DNS::RR::X25":"Net-DNS","DBI::ProfileDumper":"DBI","PApp::XSLT":"PApp","Pinto::Schema::Result::Distribution":"Pinto","Data::FormValidator::Constraints":"Data-FormValidator","Net::DNS::RR::CSYNC":"Net-DNS","Net::LDAP::Control::VLV":"perl-ldap","Catalyst::Test":"Catalyst-Runtime","Image::ExifTool::PPM":"Image-ExifTool","Crypt::PK::DSA":"CryptX","Plack::Middleware::StaticShared":"Plack-Middleware-StaticShared","Net::LDAP::Bind":"perl-ldap","App::UserAgent":"App-Context","Config::IniFiles":"Config-IniFiles","Plack::TempBuffer::PerlIO":"Plack","MojoMojo::Controller::Page":"MojoMojo","SVG::Sparkline::Line":"SVG-Sparkline","Image::ExifTool::MOI":"Image-ExifTool","ExtUtils::MakeMaker::version::regex":"ExtUtils-MakeMaker","Lemonldap::NG::Portal::2F::Engines::Default":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Lib::SAML":"Lemonldap-NG-Portal","Galileo::Plugin::Deploy":"Galileo","Apache::MP3::L10N::he":"Apache-MP3","Encode::JP::JIS7":"Encode","DBIx::Custom::Where":"DBIx-Custom","Dancer2::Template::Implementation::ForkedTiny":"Dancer2","Zonemaster::Backend::Error::PermissionDenied":"Zonemaster-Backend","XML::LibXML::InputCallback":"XML-LibXML","Tk::FBox":"Tk","Galileo::Page":"Galileo","B::Lint::Plugin::Test":"perl","Dancer::Logger::Note":"Dancer","CGI::Application::Mailform":"CGI-Application","Valiant::Util::Exception::NameNotValidator":"Valiant","Encode::utf8":"Encode","MojoMojo::Schema::Result::Person":"MojoMojo","Sub::HandlesVia::HandlerLibrary::Blessed":"Sub-HandlesVia","Perlbal::ReproxyManager":"Perlbal","CGI::Session::ID::SHA1":"CGI-Session","Tk::TextList":"Tk","Valiant::HTML::Util::Collection":"Valiant","MHonArc::UTF8::AppleRomanian":"MHonArc","Encode::MIME::Header":"Encode","Plack::Middleware::NullLogger":"Plack","Lemonldap::NG::Portal::Auth::REST":"Lemonldap-NG-Portal","DBD::Mem::db":"DBI","Valiant::Filter::With":"Valiant","Image::ExifTool::Import":"Image-ExifTool","Dancer::HTTP":"Dancer","Apache::Wyrd::Services::LoginServer":"Apache-Wyrd","Tk::DropSite":"Tk","Crypt::DSA::Key::SSH2":"Crypt-DSA","Net::DNS::RR::NAPTR":"Net-DNS","MojoMojo::Formatter::WikipediaLink":"MojoMojo","Dpkg::Control::Types":"Dpkg","Apache2::Directive":"mod_perl","MHonArc::UTF8::AppleRoman":"MHonArc","Time::gmtime":"perl","Moxy::Plugin::CookieCutter":"Moxy","Apache::Registry":"mod_perl","Elive::Connection::SDK":"Elive","Thread::Specific":"perl","Mojolicious::Plugin::PODRenderer":"Mojolicious","Apache::Session::Browseable::PgHstore":"Apache-Session-Browseable","ExtUtils::MM_QNX":"ExtUtils-MakeMaker","MojoMojo::Schema::Result::Journal":"MojoMojo","IO::Compress::Deflate":"IO-Compress","Apache::Wyrd::Services::FileCache":"Apache-Wyrd","Plack::App::File":"Plack","Jifty::Plugin::PubSub":"Jifty","Apache2::Util":"mod_perl","XAO::Web":"XAO-Web","Catalyst::Exception::Go":"Catalyst-Runtime","MHonArc::CharEnt::AppleRomanian":"MHonArc","CPAN::Eval":"CPAN","DBD::ExampleP::db":"DBI","Net::DNS::RR::CERT":"Net-DNS","DBD::Gofer::Policy::classic":"DBI","Apache::MP3::L10N::nl_be":"Apache-MP3","Crypt::Digest::Tiger192":"CryptX","CGI::Session::ID::incr":"CGI-Session","Jifty::Everything":"Jifty","MHonArc::UTF8::CP1251":"MHonArc","Apache::Wyrd::CGICond":"Apache-Wyrd","UI::Dialog::Backend::XDialog":"UI-Dialog","Apache::Wyrd::Site::WidgetControl":"Apache-Wyrd","Spoon::Formatter":"Spoon","Jifty::Web::Form::Field::DateTime":"Jifty","Apache::Wyrd::Services::Auth":"Apache-Wyrd","Pinto::Action::Default":"Pinto","Jifty::Script::Action":"Jifty","sort":"perl","Plack::Runner":"Plack","Catalyst::ActionRole::HTTPMethods":"Catalyst-Runtime","Lemonldap::NG::Portal::Plugins::LocationDetect":"Lemonldap-NG-Portal","Pinto::Action::Unpin":"Pinto","CPAN::Tarzip":"CPAN","Dpkg::Deps::AND":"Dpkg","MySQL::Admin::Session":"MySQL-Admin","Kelp::Routes::Controller":"Kelp","Crypt::Perl::X509::SCT":"Crypt-Perl","MHonArc::UTF8::ISO8859_6":"MHonArc","MIME::Head":"MIME-tools","Jifty::Test::Dist":"Jifty","Kelp::Exception":"Kelp","Jifty::Object":"Jifty","POE::Component::IRC::Plugin::PlugMan":"POE-Component-IRC","Net::LDAP::Control::DontUseCopy":"perl-ldap","remove_file_and_try_executable_again":"PAR","Config::Model::Backend::Any":"Config-Model","PApp::CGI":"PApp","Math::BigInt::LTM":"CryptX","Pinto::Role::Schema::Result":"Pinto","Crypt::Mac::OMAC":"CryptX","Lemonldap::NG::Portal::UserDB::Remote":"Lemonldap-NG-Portal","Valiant::Filter::Collection":"Valiant","Kelp::Module::Logger::Simple":"Kelp","Catalyst::Action":"Catalyst-Runtime","Tk::ROText":"Tk","Apache::ASP::ApacheCommon":"Apache-ASP","Pinto::Exception":"Pinto","MojoMojo::Controller::Comment":"MojoMojo","WWW::Mechanize::Image":"WWW-Mechanize","PApp::XML":"PApp","XML::LibXML::Reader":"XML-LibXML","Batch::Batchrun::Retain":"Batch-Batchrun","Mite::Project":"Mite","Jifty::Plugin::ErrorTemplates":"Jifty","File::GlobMapper":"IO-Compress","Tk::DragDrop::Win32Site":"Tk","Image::ExifTool::Charset":"Image-ExifTool","HTML::EP::CGIEncryptForm":"HTML-EP","Mysql::dr":"DBD-mysql","Data::FormValidator::Filters":"Data-FormValidator","Crypt::Checksum":"CryptX","Jifty::Plugin::OnlineDocs::Dispatcher":"Jifty","Batch::Batchrun::BuildFile":"Batch-Batchrun","Encode::UTF_EBCDIC":"Encode","Lemonldap::NG::Portal::Plugins::NewLocationWarning":"Lemonldap-NG-Portal","Mojolicious::Plugin::DefaultHelpers":"Mojolicious","Dancer::Response":"Dancer","Dpkg::Path":"Dpkg","Net::LDAP::Extension":"perl-ldap","Mojo::File":"Mojolicious","Net::DNS::RR::HINFO":"Net-DNS","Net::Dropbear::SSH":"Net-Dropbear","Jifty::Bootstrap":"Jifty","Moxy::Plugin::Bookmark":"Moxy","Net::DNS::RR::DNAME":"Net-DNS","XML::LibXML::Attr":"XML-LibXML","Crypt::Perl::Ed25519::PublicKey":"Crypt-Perl","Crypt::Cipher::SEED":"CryptX","PApp::I18n::PO_Reader":"PApp","Pinto::Action::Stacks":"Pinto","Image::ExifTool::Lang::it":"Image-ExifTool","HTML::Template::Pro::WrapAssociate":"HTML-Template-Pro","HTTP::Tiny::NoProxy":"Dancer","XML::LibXML::NamedNodeMap":"XML-LibXML","Tk::IO":"Tk","Apache::Wyrd::Datum::Blob":"Apache-Wyrd","PApp::SCGI::Worker":"PApp","Moxy::Session::State::BasicAuth":"Moxy","Config::Model::Lister":"Config-Model","CGI::Session::PostgreSQL":"CGI-Session","Catalyst::Controller":"Catalyst-Runtime","App::Session::HTMLHidden":"App-Context","App::Pinto::Command::unlock":"Pinto","Image::ExifTool::PNG":"Image-ExifTool","Bio::Graphics::Browser2::AdminTracks":"GBrowse","HTML::EP::Session::DBIq":"HTML-EP","Dancer2::Core::Hook":"Dancer2","Dpkg::Vendor::Ubuntu":"Dpkg","Archive::Zip::DirectoryMember":"Archive-Zip","MHonArc::CharEnt::KOI8_B":"MHonArc","Config::Model::Value":"Config-Model","Elive::Entity":"Elive","Apache::Session::Browseable::Postgres":"Apache-Session-Browseable","Tie::Hash":"perl","SOAP::Lite":"SOAP-Lite","HTML::Template::Pro":"HTML-Template-Pro","Lemonldap::NG::Portal::Lib::Choice":"Lemonldap-NG-Portal","MHonArc::UTF8::AppleArabic":"MHonArc","SVG::Sparkline::Area":"SVG-Sparkline","Data::Entropy::RawSource::CryptCounter":"Data-Entropy","Tk::Entry":"Tk","Elive::Entity::Recording":"Elive","IO::Uncompress::Adapter::Identity":"IO-Compress","Dpkg::Changelog::Parse":"Dpkg","CGI":"CGI","Jifty::DBI::Record::Memcached":"Jifty-DBI","Pinto::Repository":"Pinto","Jifty::Action::Record::Search":"Jifty","Bio::Graphics::Browser2::UserTracks::Database":"GBrowse","MojoMojo::Formatter::DocBook::Colorize":"MojoMojo","Lemonldap::NG::Portal::Main::Request":"Lemonldap-NG-Portal","Tk::ErrorDialog":"Tk","Imager::Transform":"Imager","Jifty::Plugin::User::Mixin::Model::User":"Jifty","Net::OAuth::Request":"Net-OAuth","Tk::Clipboard":"Tk","Image::ExifTool::7Z":"Image-ExifTool","Pinto::Manual::Installing":"Pinto","Tk::Mwm":"Tk","Apache::MP3::L10N::uk":"Apache-MP3","Lemonldap::NG::Portal::UserDB::Combination":"Lemonldap-NG-Portal","Email::MIME::Creator":"Email-MIME","Image::ExifTool::DjVu":"Image-ExifTool","Mite::Trait::HasSuperclasses":"Mite","Valiant::HTML::TagBuilder":"Valiant","LWP::Protocol::cpan":"libwww-perl","pipe_a_command":"PAR","Kossy::BodyParser::UrlEncoded":"Kossy","Config::Model::Exception::ObsoleteElement":"Config-Model","RT::Authen::ExternalAuth::DBI":"RT-Authen-ExternalAuth","I18N::LangTags":"perl","Apache::Opcode":"mod_perl","Jifty::DBI::Record":"Jifty-DBI","Dpkg::Source::Archive":"Dpkg","DBD::Proxy::st":"DBI","Dancer2::Core::Time":"Dancer2","CGI::Application":"CGI-Application","Dpkg::Control::Info":"Dpkg","Parallel::ForkManager::Child":"Parallel-ForkManager","Jifty::Plugin::LetMe":"Jifty","Tk::Image":"Tk","MHonArc::CharEnt::ISO8859_13":"MHonArc","Tk::Scrollbar":"Tk","OverloadedClass":"CGI-Session","PAR::Filter":"PAR-Packer","DBD::NullP":"DBI","Apache::Wyrd::Template":"Apache-Wyrd","CGI::Session::CookBook":"CGI-Session","Tk::Canvas":"Tk","Image::ExifTool::MRC":"Image-ExifTool","Moxy::Plugin::LocationBar":"Moxy","MHonArc::CharEnt::ISO8859_5":"MHonArc","Crypt::Perl::Ed25519::Math":"Crypt-Perl","File::DataClass::Storage::JSON":"File-DataClass","Net::SNMP::Transport::TCP":"Net-SNMP","Crypt::PK::RSA":"CryptX","SOAP::XMLSchemaSOAP1_2::Deserializer":"SOAP-Lite","Image::ExifTool::ISO":"Image-ExifTool","Crypt::Cipher::RC6":"CryptX","DBD::Mem":"DBI","Apache::AuthCAS":"Apache-AuthCAS","java::lang::String":"perl","Dpkg::Source::Package::V3::Native":"Dpkg","Valiant::Validator::Inclusion":"Valiant","App::Pinto::Command::install":"Pinto","Spoon::Plugin":"Spoon","XAO::DO::Web::Footer":"XAO-Web","Net::DNS::RR::KEY":"Net-DNS","Tk::Submethods":"Tk","Bundle::Apache::ASP":"Apache-ASP","Pinto::SpecFactory":"Pinto","Net::DNS::RR::OPT::KEY_TAG":"Net-DNS","Perlbal::Plugin::Highpri":"Perlbal","App::Serializer::Xml":"App-Context","Pod::Perldoc::ToXml":"Pod-Perldoc","Tk::Message":"Tk","MIME::Decoder::Binary":"MIME-tools","Mojo::IOLoop":"Mojolicious","MHonArc::UTF8::ISO8859_3":"MHonArc","Config::Model::AnyId":"Config-Model","Net::LDAP::Search":"perl-ldap","CPAN::Kwalify":"CPAN","Dancer::Renderer":"Dancer","Valiant::HTML::Util::Collection::Item":"Valiant","Jifty::Web::Form::Field::Checkbox":"Jifty","Jifty::Model::Session":"Jifty","Lemonldap::NG::Portal::UserDB::Slave":"Lemonldap-NG-Portal","Tk::Xrm":"Tk","test_in_further_subdir":"PAR","Net::servent":"perl","Apache::Wyrd::SQLForm":"Apache-Wyrd","Jifty::Test::WWW::WebDriver":"Jifty","Search::OpenSearch::Result":"Search-OpenSearch-Server","SOAP::Transport::MAILTO":"SOAP-Lite","Image::ExifTool::Geotag":"Image-ExifTool","Dpkg::Vars":"Dpkg","Apache::Session::Browseable::Sybase":"Apache-Session-Browseable","Dancer2::Core::Role::SessionFactory::File":"Dancer2","Lemonldap::NG::Portal::Auth::_WebForm":"Lemonldap-NG-Portal","Plack::Session::Store::Cache":"Plack-Middleware-Session","DBD::Sponge":"DBI","Dancer2::Core::Runner":"Dancer2","DBIx::Custom::Query":"DBIx-Custom","XML::LibXML::SAX":"XML-LibXML","testcases::base":"XAO-Web","Bundle::DBI":"DBI","Apache::Session::Browseable::Oracle":"Apache-Session-Browseable","Crypt::Stream::ChaCha":"CryptX","Tk::Panedwindow":"Tk","Bio::DB::Tagger::Iterator":"GBrowse","Jifty::Web::Form::Element":"Jifty","Mite::Signature::Compiler":"Mite","Apache::Wyrd::Attribute":"Apache-Wyrd","XAO::PageSupport":"XAO-Web","Apache::Wyrd::Number":"Apache-Wyrd","Galileo::DB::Schema::Result::Page":"Galileo","Bundle::Net::LDAP":"perl-ldap","Net::DNS::Resolver::UNIX":"Net-DNS","Moxy::Plugin::AuthorizationCutter":"Moxy","Crypt::Perl::KeyBase":"Crypt-Perl","Crypt::Perl::PKCS10::Attribute::extensionRequest":"Crypt-Perl","Image::ExifTool::ASF":"Image-ExifTool","Search::OpenSearch::Server::Catalyst":"Search-OpenSearch-Server","Pod::Perldoc::ToRtf":"Pod-Perldoc","Bio::Graphics::Browser2::DataLoader::gff3":"GBrowse","Jifty::Plugin::RequestInspector":"Jifty","Dpkg::Compression::Process":"Dpkg","Module::ScanDeps":"Module-ScanDeps","CPAN::Version":"CPAN","yaml_mapping":"YAML","Pinto::Manual::Introduction":"Pinto","Sub::HandlesVia::Toolkit::Plain":"Sub-HandlesVia","Apache::Wyrd::ErrField":"Apache-Wyrd","MojoMojo::Extensions::Counter":"MojoMojo","Pinto::Action::List":"Pinto","Lemonldap::NG::Portal::Auth::WebID":"Lemonldap-NG-Portal","Mojo::Exception::_Guard":"Mojolicious","Tie::Handle":"perl","Crypt::Stream::Sober128":"CryptX","App::Pinto::Command::manual":"Pinto","Image::ExifTool::Matroska":"Image-ExifTool","DBD::File::dr":"DBI","Perlbal::ManageCommand":"Perlbal","Spreadsheet::ParseXLSX::Decryptor::Standard":"Spreadsheet-ParseXLSX","MHonArc::UTF8::AppleCenteuro":"MHonArc","App::Serializer::XMLDumper":"App-Context","Perlbal::BackendHTTP":"Perlbal","Apache::RedirectLogFix":"mod_perl","Jifty::DBI::Filter::URI":"Jifty-DBI","Image::ExifTool::CaptureOne":"Image-ExifTool","Lemonldap::NG::Portal::Auth::_Ajax":"Lemonldap-NG-Portal","Config::Model::Annotation":"Config-Model","Mojo::Reactor::Poll":"Mojolicious","Valiant::HTML::PagerBuilder":"Valiant","Image::ExifTool::Motorola":"Image-ExifTool","CPAN::Index":"CPAN","MHonArc::UTF8::HP_ROMAN8":"MHonArc","Pinto::Action::Install":"Pinto","Config::Model::Backend::PerlFile":"Config-Model","Image::ExifTool::Lang::sk":"Image-ExifTool","Apache::Wyrd::Site::WidgetIndex":"Apache-Wyrd","Config::Model::Role::FileHandler":"Config-Model","Lemonldap::NG::Portal::2F::TOTP":"Lemonldap-NG-Portal","PalImg":"Perlbal","Jifty::Script::Help":"Jifty","Apache::RegistryNG":"mod_perl","Crypt::Cipher::Camellia":"CryptX","Elive::Entity::User":"Elive","Catalyst::Exception::Basic":"Catalyst-Runtime","MojoMojo::Formatter":"MojoMojo","Proc::ProcessTable::Process":"Proc-ProcessTable","Net::IPAddress::Util::Collection":"Net-IPAddress-Util","App::Pinto::Command::default":"Pinto","Bio::Graphics::Browser2::UserTracks::Filesystem":"GBrowse","Net::LDAP::Control::Sort":"perl-ldap","Apache::Session::Browseable::Store::LDAP":"Apache-Session-Browseable","Jifty::Plugin::Authentication::Password":"Jifty","Net::LDAP::Control":"perl-ldap","Kelp::Context":"Kelp","Net::LDAP":"perl-ldap","Image::ExifTool::Shortcuts":"Image-ExifTool","Crypt::Salt":"Crypt-Salt","Tk::Stats":"Tk","Plack::App::Cascade":"Plack","Image::ExifTool::JVC":"Image-ExifTool","Dancer::Serializer::Abstract":"Dancer","Dezi::Server":"Dezi","Mite::App::Command":"Mite","Bio::Graphics::Wiggle::Loader::Nosample":"GBrowse","File::DataClass::ResultSource":"File-DataClass","Apache::Wyrd::Site::Page":"Apache-Wyrd","Legacy::Graphics::Browser::I18n":"GBrowse","MojoMojo::Formatter::File":"MojoMojo","Image::ExifTool::Jpeg2000":"Image-ExifTool","Image::ExifTool::LIF":"Image-ExifTool","Apache2::URI":"mod_perl","Batch::Batchrun::TableFunctions":"Batch-Batchrun","Mail::Address":"MailTools","GD::Polyline":"GD","XML::LibXML::Pattern":"XML-LibXML","IO::Uncompress::Bunzip2":"IO-Compress","Dancer2::Logger::Null":"Dancer2","Moxy::Attribute::CarrierHook":"Moxy","ModPerl::Manifest":"mod_perl","VMS::Filespec":"perl","Net::OAuth::SignatureMethod::HMAC_SHA1":"Net-OAuth","Log::Any::Test":"Log-Any","SOAP::Transport::HTTP::Daemon::ForkOnAccept":"SOAP-Lite","CPAN::Distroprefs":"CPAN","LWP::Authen::Ntlm":"libwww-perl","HTTP::Daemon::ClientConn":"HTTP-Daemon","RPC::XML::Procedure":"RPC-XML","IPC::Run::Win32Helper":"IPC-Run","DBIx::Custom":"DBIx-Custom","Crypt::Digest::BLAKE2b_512":"CryptX","Apache::Wyrd::Datum::Enum":"Apache-Wyrd","Net::OAuth":"Net-OAuth","Linux::Statm::Tiny::Mite":"Linux-Statm-Tiny","Net::Server::Fork":"Net-Server","WebService::Xero::Item":"WebService-Xero","Catalyst::Action::REST::ForBrowsers":"Catalyst-Action-REST","Valiant::Validator::With":"Valiant","Crypt::Digest::MD5":"CryptX","JPL::Compile":"perl","Image::ExifTool::Ricoh":"Image-ExifTool","Perlbal::Service":"Perlbal","Moxy::Plugin::StripScripts":"Moxy","Imager::Test::OverUtf8":"Imager","Spoon::Base":"Spoon","Net::LDAP::Control::Subentries":"perl-ldap","MHonArc::CharEnt::ISO8859_11":"MHonArc","DBD::Gofer::Transport::pipeone":"DBI","MHonArc::Char::KR":"MHonArc","Apache::ASP::Load":"Apache-ASP","DBIx::Class::EncodedColumn::Digest":"DBIx-Class-EncodedColumn","ExtUtils::MY":"ExtUtils-MakeMaker","ModPerl::PerlRun":"mod_perl","XAO::DO::Web::Clipboard":"XAO-Web","Image::ExifTool::Other":"Image-ExifTool","Net::hostent":"perl","Mojo::DynamicMethods":"Mojolicious","App::Response":"App-Context","App::Packer::Temp":"PAR","XAO::DO::Web::Default":"XAO-Web","Apache::RegistryBB":"mod_perl","LWP::Protocol::nntp":"libwww-perl","Mojolicious::Command::Author::generate::makefile":"Mojolicious","Plack::Handler::CGI::Writer":"Plack","Net::SNMP::Transport":"Net-SNMP","Apache2::Response":"mod_perl","Catalyst::Action::Serialize::JSON":"Catalyst-Action-REST","Spoon::Utils":"Spoon","Dancer::Handler":"Dancer","Parallel::ForkManager":"Parallel-ForkManager","Mail::Field::Generic":"MailTools","PApp::Callback::Function":"PApp","App::Session::Cookie":"App-Context","WWW::Mechanize::Link":"WWW-Mechanize","DBI::Gofer::Execute":"DBI","Config::Model::TreeSearcher":"Config-Model","Net::LDAP::Control::ManageDsaIT":"perl-ldap","Perlbal::AIO":"Perlbal","Pinto::Action::Revert":"Pinto","App::LogChannel":"App-Context","Jifty::Plugin::Authentication::Password::Action::SendAccountConfirmation":"Jifty","Archive::Tar::Constant":"Archive-Tar","ExtUtils::Typemaps::Cmd":"ExtUtils-ParseXS","File::Spec::AmigaOS":"PathTools","Apache::Session::Serialize::Hstore":"Apache-Session-Browseable","Elive::Entity::ServerDetails":"Elive","Dancer2::CLI":"Dancer2","SVG::Sparkline::Bar":"SVG-Sparkline","ExtUtils::ParseXS::CountLines":"ExtUtils-ParseXS","Imager::Color::Table":"Imager","HTML::StripScripts":"HTML-StripScripts","SOAP::Schema":"SOAP-Lite","File::Temp":"File-Temp","GitLab::API::v4::Mock::RESTClient":"GitLab-API-v4","MHonArc::CharEnt::ISO8859_16":"MHonArc","Hash::Util::FieldHash":"perl","Jifty::Action::Record::Delete":"Jifty","Plack::Middleware::LogDispatch":"Plack","PAR":"PAR","XS::Typemap":"perl","Config::Model::AnyThing":"Config-Model","Moxy::Plugin::GPS::DoCoMo":"Moxy","ModPerl::Util":"mod_perl","PApp::EditForm":"PApp","LWP::Protocol::https::Socket":"LWP-Protocol-https","Sub::HandlesVia::Toolkit::Mite":"Sub-HandlesVia","CPAN::Exception::blocked_urllist":"CPAN","Dpkg":"Dpkg","Dancer2::Template::TemplateToolkit":"Dancer2","XML::Atom::Content":"XML-Atom","Pinto::Action::Look":"Pinto","Config::Model::Exception::Internal":"Config-Model","Lemonldap::NG::Portal::Lib::CAS":"Lemonldap-NG-Portal","App::Serializer::OneLine":"App-Context","Win32CORE":"perl","PAR::Filter::Bleach":"PAR-Packer","APR::Request::Error":"libapreq2","Image::ExifTool::Torrent":"Image-ExifTool","Pinto::Action::Props":"Pinto","MojoMojo::Schema::Result::Content":"MojoMojo","MIME::Words":"MIME-tools","MIME::Body::File":"MIME-tools","Image::ExifTool::MISB":"Image-ExifTool","Crypt::Digest::Whirlpool":"CryptX","Jifty::TestServer":"Jifty","Image::ExifTool::ID3":"Image-ExifTool","IO::Compress::Gzip":"IO-Compress","Mojo::Log":"Mojolicious","Net::OAuth::AccessTokenResponse":"Net-OAuth","DBI::ProfileDumper::Apache":"DBI","Kelp::Module::Config::Less":"Kelp","Plack::Component":"Plack","Dancer2::CLI::Version":"Dancer2","CGI::Session::Serialize::default":"CGI-Session","Apache::MP3::L10N::x_marklar":"Apache-MP3","Bundle::Image::Info::PNG":"Image-Info","Spoon::Command":"Spoon","NDBM_File":"perl","Crypt::Digest::SHAKE":"CryptX","Pinto::Action::Lock":"Pinto","ModPerl::CScan":"mod_perl","Image::ExifTool::DV":"Image-ExifTool","Crypt::Perl::ECDSA::PrivateKey":"Crypt-Perl","DBI::Gofer::Transport::Base":"DBI","Mojolicious::Plugin::EPLRenderer":"Mojolicious","Jifty::Plugin::Authentication::Password::Action::Logout":"Jifty","Dancer2::Core::Response::Delayed":"Dancer2","Log::Any::Adapter::Syslog":"Log-Any","Bundle::HTML::EP":"HTML-EP","Moxy::Plugin::UserAgentSwitcher":"Moxy","Apache::Wyrd::Form::Preload":"Apache-Wyrd","Mojo::IOLoop::Stream":"Mojolicious","Apache::MP3::L10N::ga":"Apache-MP3","Image::ExifTool":"Image-ExifTool","Spreadsheet::ParseXLSX":"Spreadsheet-ParseXLSX","Batch::Batchrun":"Batch-Batchrun","CPAN::Plugin":"CPAN","DBI":"DBI","Apache::MP3::L10N::nl_nl":"Apache-MP3","IPC::Run::Timer":"IPC-Run","Perlbal::SocketSSL2":"Perlbal","MojoMojo::Model::Search":"MojoMojo","MHonArc::UTF8::KOI8_B":"MHonArc","Catalyst::DispatchType::Path":"Catalyst-Runtime","Jifty::Web::Session::ClientSide":"Jifty","Log::Any::Adapter::Null":"Log-Any","UI::Dialog::KDE":"UI-Dialog","Perlbal::ClientProxy":"Perlbal","Net::DNS::Update":"Net-DNS","Module::Metadata":"Module-Metadata","Mojolicious::Command::generate::plugin":"Mojolicious","Bundle::Apache2":"mod_perl","Valiant::Filter::ToArray":"Valiant","Mite::Source":"Mite","MHonArc::CharEnt::BIG5_HKSCS":"MHonArc","Bio::Graphics::Browser2::Render::Slave::StagingServer":"GBrowse","Crypt::Perl::ECDSA::EC::DB":"Crypt-Perl","Crypt::Digest::BLAKE2s_128":"CryptX","CPAN::Mirrored::By":"CPAN","Jifty::DBI::SchemaGenerator":"Jifty-DBI","Sub::HandlesVia::HandlerLibrary::Scalar":"Sub-HandlesVia","MIME::Field::ParamVal":"MIME-tools","IPC::Cmd":"IPC-Cmd","Spreadsheet::ParseExcel::FmtDefault":"Spreadsheet-ParseExcel","Mojo::Upload":"Mojolicious","Bio::DB::GFF::Aggregator::reftranscript":"GBrowse","Dancer2::Core::Request":"Dancer2","Mail::Mailer::qmail":"MailTools","Valiant::Validator::Numericality":"Valiant","MHonArc::CharEnt::CP950":"MHonArc","Archive::Zip::NewFileMember":"Archive-Zip","MIME::Parser::InnerFile":"MIME-tools","App::Serializer::Yaml":"App-Context","DBD::DBM::Statement":"DBI","Jifty::DBI::HasFilters":"Jifty-DBI","Catalyst::Controller::REST":"Catalyst-Action-REST","Valiant::Proxy::Array":"Valiant","XML::Atom::Client":"XML-Atom","Mojo::UserAgent":"Mojolicious","Mail::Mailer::testfile":"MailTools","Tk::DragDrop::Rect":"Tk","Dpkg::Substvars":"Dpkg","Lemonldap::NG::Portal::UserDB::OpenIDConnect":"Lemonldap-NG-Portal","Dpkg::Source::Quilt":"Dpkg","Mysql::db":"DBD-mysql","DBD::SQLite::VirtualTable::PerlData::Cursor":"DBD-SQLite","Pinto::Locator::Mirror":"Pinto","Image::ExifTool::Opus":"Image-ExifTool","Valiant::Validator":"Valiant","Mojo::Transaction":"Mojolicious","DBI::Gofer::Request":"DBI","DBD::Sponge::dr":"DBI","DBI::Const::GetInfoType":"DBI","SVG::Sparkline::Whisker":"SVG-Sparkline","Mojolicious::Command::generate::makefile":"Mojolicious","DBI::Library::st":"MySQL-Admin","Plack::Middleware::AccessLog::Timed":"Plack","Bio::Graphics::Browser2::Session":"GBrowse","Config::Model::Describe":"Config-Model","Apache::Wyrd::Interfaces::IndexUser":"Apache-Wyrd","CPAN::Prompt":"CPAN","Image::ExifTool::PrintIM":"Image-ExifTool","Net::LDAP::Control::SyncRequest":"perl-ldap","SOAP::XMLSchemaSOAP1_1::Deserializer":"SOAP-Lite","Lemonldap::NG::Portal::Auth::SSL":"Lemonldap-NG-Portal","MHonArc::CharEnt::CP949":"MHonArc","Apache::RPC::Status":"RPC-XML","DBD::Sponge::db":"DBI","MHonArc::CharEnt::AppleIceland":"MHonArc","Mojo::Reactor":"Mojolicious","MojoMojo::Schema::Result::PageVersion":"MojoMojo","Plack::Test::Server":"Plack","IO::Compress::Base":"IO-Compress","XAO::DO::Web::Config":"XAO-Web","Tk::Menu::Cascade":"Tk","Net::LDAP::FilterList":"perl-ldap","Valiant::Filter::Upper":"Valiant","Dpkg::Package":"Dpkg","Bio::DB::GFF::Aggregator::waba_alignment":"GBrowse","Pinto::Action::New":"Pinto","Lemonldap::NG::Portal::2F::Register::Yubikey":"Lemonldap-NG-Portal","ExtUtils::MM_DOS":"ExtUtils-MakeMaker","Dpkg::Control::Tests::Entry":"Dpkg","MHonArc::CharEnt::GOST19768_87":"MHonArc","Kelp::Routes::Pattern":"Kelp","SDBM_File":"perl","Image::ExifTool::Audible":"Image-ExifTool","Config::Model::Exception::WarpError":"Config-Model","Dancer2::Core::Route":"Dancer2","Net::OAuth::RequestTokenRequest":"Net-OAuth","Jifty::Collection":"Jifty","Search::OpenSearch::Server":"Search-OpenSearch-Server","Moxy::Plugin::GPS::AirHPhone":"Moxy","Net::DNS::RR::SOA":"Net-DNS","Bio::Graphics::Browser2::Render":"GBrowse","Mite::Types":"Mite","Agni":"PApp","App::SessionObject":"App-Context","Jifty::Web::Form::Field::Radio":"Jifty","PApp::Log":"PApp","Net::LDAP::DSML::output":"perl-ldap","Jifty::Script::FastCGI":"Jifty","Config::Model::Backend::CdsFile":"Config-Model","MIME::Parser":"MIME-tools","Crypt::Misc":"CryptX","Encode::XS":"Encode","DBIx::Class::Valiant::Result":"Valiant","Crypt::DSA::Util":"Crypt-DSA","Pinto::Role::Plated":"Pinto","Catalyst::Action::Deserialize::View":"Catalyst-Action-REST","SVG::Sparkline::RangeBar":"SVG-Sparkline","overload":"perl","App::Pinto::Command::add":"Pinto","Perlbal":"Perlbal","Lemonldap::NG::Portal::Plugins::TrustedBrowser":"Lemonldap-NG-Portal","Crypt::Digest::MD2":"CryptX","CPAN::Nox":"CPAN","DBIx::Otogiri::Iterator":"Otogiri","Dancer2::Session::Simple":"Dancer2","Crypt::Perl::X509::GeneralNames":"Crypt-Perl","Net::LDAPI":"perl-ldap","Net::DNS::RR::DS":"Net-DNS","Crypt::AuthEnc::OCB":"CryptX","Pinto::Server::Responder::Action":"Pinto","Lemonldap::NG::Portal::Auth::Radius":"Lemonldap-NG-Portal","Apache2::RequestUtil":"mod_perl","Net::DNS::RR::APL::Item":"Net-DNS","GPIB::ni":"GPIB","less":"perl","B::Terse":"perl","Dezi::Config":"Dezi","XML::LibXML::Literal":"XML-LibXML","Dancer::Serializer::JSONP":"Dancer","HTML::Menu::Pages":"MySQL-Admin","Image::ExifTool::SonyIDC":"Image-ExifTool","DBD::MariaDB":"DBD-MariaDB","Plack::Builder":"Plack","APR::FunctionTable":"mod_perl","Dpkg::Deps::Multiple":"Dpkg","CPAN::Queue::Item":"CPAN","Lemonldap::NG::Portal::Plugins::SamlFederation":"Lemonldap-NG-Portal","DBI::SQL::Nano":"DBI","DBD::mysqlPP":"DBD-mysqlPP","Imager::Fountain":"Imager","XAO::DO::Web::MenuBuilder":"XAO-Web","Jifty::Action::AboutMe":"Jifty","MDK::Common::String":"MDK-Common","Config::Model::ListId":"Config-Model","Apache::Session::Browseable::Store::Oracle":"Apache-Session-Browseable","Jifty::Server::Prefork::NetServer":"Jifty","Crypt::Mac::F9":"CryptX","Jifty::Server::Fork":"Jifty","SOAP::Transport::TCP":"SOAP-Lite","ModPerl::TypeMap":"mod_perl","Net::Server::PSGI":"Net-Server","Crypt::Perl::X::ASN1::Decode":"Crypt-Perl","Encode::MIME::Name":"Encode","ExtUtils::MM_OS390":"ExtUtils-MakeMaker","Lemonldap::NG::Portal::Register::Base":"Lemonldap-NG-Portal","Crypt::Perl::X::ASN1::Prepare":"Crypt-Perl","Crypt::Digest::SHA256":"CryptX","Perlbal::Plugin::EchoService::Client":"Perlbal","Dpkg::OpenPGP::Backend::Sequoia":"Dpkg","XML::DT":"XML-DT","Plack::Middleware::Refresh":"Plack","Config::Model::Report":"Config-Model","Jifty::Plugin::Authentication::Password::Action::ResendConfirmation":"Jifty","CPAN::Debug":"CPAN","Net::LDAP::Extension::Refresh":"perl-ldap","Sub::HandlesVia::Toolkit":"Sub-HandlesVia","App::Request::CGI":"App-Context","Plack::Middleware::Conditional":"Plack","POE::Component::IRC::Plugin::FollowTail":"POE-Component-IRC","App::Pinto::Command::migrate":"Pinto","Dancer::Template::TemplateToolkit":"Dancer","Dpkg::Source::BinaryFiles":"Dpkg","SOAP::Transport::POP3::Server":"SOAP-Lite","Image::ExifTool::Stim":"Image-ExifTool","Config::Model::Exception::UnavailableElement":"Config-Model","Tk::English":"Tk","Plack::Middleware::IIS7KeepAliveFix":"Plack","Dpkg::Control::Hash":"Dpkg","MojoMojo::Formatter::TOC":"MojoMojo","Data::FormValidator":"Data-FormValidator","POE::Component::IRC::Plugin::Whois":"POE-Component-IRC","Catalyst::Action::SerializeBase":"Catalyst-Action-REST","CGI::Session::Driver::DBI":"CGI-Session","MojoMojo::I18N":"MojoMojo","Net::DNS::RR::DLV":"Net-DNS","SOAP::Utils":"SOAP-Lite","DBI::Util::CacheMemory":"DBI","App::Github::Email":"App-Github-Email","Dpkg::OpenPGP::Backend::GnuPG":"Dpkg","Dancer::Template::Abstract":"Dancer","Dpkg::Lock":"Dpkg","Agni::Callback":"PApp","U64":"IO-Compress","Image::ExifTool::JPEG":"Image-ExifTool","Pinto::Manual":"Pinto","Tie::Watch":"Tk","Crypt::PRNG":"CryptX","PApp::ECMAScript":"PApp","Mojo::URL":"Mojolicious","Sub::HandlesVia::Handler::CodeRef":"Sub-HandlesVia","Tk::Font":"Tk","MHonArc::UTF8::BIG5_ETEN":"MHonArc","Tie::SubstrHash":"perl","Net::LDAP::Extension::WhoAmI":"perl-ldap","Apache::MP3::L10N::nl":"Apache-MP3","Plack::Middleware::Writer":"Plack","Apache2::Request":"libapreq2","File::Spec::Cygwin":"PathTools","Moxy::Plugin::GPS::EZweb":"Moxy","Devel::Peek":"perl","Bio::Graphics::Browser2::Render::Login":"GBrowse","Catalyst::DispatchType::Index":"Catalyst-Runtime","MHonArc::CharEnt::ISO8859_3":"MHonArc","App::Serializer::Json":"App-Context","Lemonldap::NG::Portal::Plugins::Upgrade":"Lemonldap-NG-Portal","Plack::Session::State":"Plack-Middleware-Session","Tk::IconList":"Tk","Image::ExifTool::MIFF":"Image-ExifTool","Tk::MMtry":"Tk","Bio::Graphics::Browser2::DataLoader::useq":"GBrowse","Spreadsheet::ParseExcel::SaveParser::Workbook":"Spreadsheet-ParseExcel","Mojolicious::Routes::Route":"Mojolicious","vars":"perl","App::Pinto::Command::list":"Pinto","Kelp::Util":"Kelp","Perlbal::CommandContext":"Perlbal","Crypt::Perl::X509::Extensions":"Crypt-Perl","Net::LDAP::Control::SortResult":"perl-ldap","Image::ExifTool::DNG":"Image-ExifTool","XML::Atom::Util":"XML-Atom","Crypt::Perl::X::UnknownHash":"Crypt-Perl","Catalyst::Action::Serialize::XML::Simple":"Catalyst-Action-REST","Module::Provision::Base":"Module-Provision","JPL::AutoLoader":"perl","Valiant::Filter::Template":"Valiant","Dpkg::BuildFlags":"Dpkg","Zonemaster::Backend::Validator":"Zonemaster-Backend","Jifty::Web::Menu":"Jifty","HTML::Perlinfo::Apache":"HTML-Perlinfo","Apache::Wyrd::Site::Widget":"Apache-Wyrd","Lemonldap::NG::Portal::Plugins::RESTServer":"Lemonldap-NG-Portal","App::Context::ModPerl":"App-Context","Proc::ProcessTable":"Proc-ProcessTable","Config::Model::Backend::PlainFile":"Config-Model","Mite::ModuleBuild":"Mite","MHonArc::UTF8::KOI_7":"MHonArc","MHonArc::UTF8::CP1254":"MHonArc","Lemonldap::NG::Portal::2F::Register::TOTP":"Lemonldap-NG-Portal","Config::Model::Exception::User":"Config-Model","CPAN::HTTP::Client":"CPAN","MojoMojo::Formatter::Gist":"MojoMojo","Net::Xero":"Net-Xero","Plack::Test::MockHTTP":"Plack","Apache::Wyrd::Form::Template":"Apache-Wyrd","Perlbal::Plugin::Cgilike":"Perlbal","HTML::EP::Locale":"HTML-EP","POE::Component::IRC::Plugin::CycleEmpty":"POE-Component-IRC","DBD::DBM::dr":"DBI","Tk::LabEntry":"Tk","XML::LibXML::Namespace":"XML-LibXML","PApp::CGI::Request":"PApp","SelectSaver":"perl","Email::MIME::Header::AddressList":"Email-MIME","Dpkg::Control::Tests":"Dpkg","Plack::Middleware::Chunked":"Plack","MHonArc::CharEnt::KOI_7":"MHonArc","Pinto::Role::Transactional":"Pinto","Lemonldap::NG::Portal::Auth::Twitter":"Lemonldap-NG-Portal","Net::DNS::RR::OPT::PADDING":"Net-DNS","Lemonldap::NG::Portal::Lib::Combination::UserLogger":"Lemonldap-NG-Portal","Net::DNS::RR::OPT::REPORT_CHANNEL":"Net-DNS","Net::Server::Multiplex::MUX":"Net-Server","CGI::HTML::Functions":"CGI","Dancer2::Handler::File":"Dancer2","Bio::Graphics::Browser2::MetaSegment":"GBrowse","Crypt::Mac::Pelican":"CryptX","MHonArc::CharEnt::ISO8859_6":"MHonArc","Bio::Graphics::Browser2::UserDB":"GBrowse","GD::Group":"GD","Tk::Widget":"Tk","MojoMojo::Schema::Result::Link":"MojoMojo","Encode::Encoding":"Encode","HTML::PullParser":"HTML-Parser","Net::DNS::RR::PTR":"Net-DNS","App::Serializer::Ini":"App-Context","Jifty::Script::WriteCCJS":"Jifty","Dpkg::Control::HashCore::Tie":"Dpkg","Dancer::Session::YAML":"Dancer","Mojo::IOLoop::TLS":"Mojolicious","MIME::Decoder::QuotedPrint":"MIME-tools","Image::ExifTool::OOXML":"Image-ExifTool","Crypt::Cipher::SAFER_SK64":"CryptX","Jifty::Request":"Jifty","Config::Extensions":"perl","Jifty::Plugin::SQLQueries::View":"Jifty","MojoMojo::Model::Themes":"MojoMojo","MojoMojo::Extension":"MojoMojo","Sub::HandlesVia::Toolkit::ObjectPad":"Sub-HandlesVia","Plack::Middleware::XSendfile":"Plack","Mysql::st":"DBD-mysql","App::Pinto::Command::nop":"Pinto","APR::String":"mod_perl","Jifty::Script::Server":"Jifty","Valiant::Validates":"Valiant","App::Pinto::Command::verify":"Pinto","Apache::Wyrd::Redirect":"Apache-Wyrd","Sub::HandlesVia::HandlerLibrary::Counter":"Sub-HandlesVia","Crypt::Perl::X509::Extension::extKeyUsage":"Crypt-Perl","My::PingPong":"SOAP-Lite","Net::SNMP::PDU":"Net-SNMP","Image::Info::ICO":"Image-Info","Apache::StatINC":"mod_perl","POE::Component::IRC::Qnet::State":"POE-Component-IRC","Jifty::Web::Session::JDBI":"Jifty","Mojolicious::Types":"Mojolicious","Class::Struct":"perl","Lemonldap::NG::Portal::Plugins::AuthOidcPkce":"Lemonldap-NG-Portal","Jifty::Logger":"Jifty","Jifty::Web::Form::Link":"Jifty","PApp::XBox":"PApp","CGI::Simple::Util":"CGI-Simple","MHonArc::CharEnt::CP1253":"MHonArc","Imager::CountColor":"Imager","SOAP::Schema::WSDL":"SOAP-Lite","ExtUtils::MakeMaker::charstar":"ExtUtils-MakeMaker","Tk::MainWindow":"Tk","Apache::ExtUtils":"mod_perl","Data::Entropy::RawSource::Local":"Data-Entropy","Apache::Wyrd::Interfaces::Indexable":"Apache-Wyrd","Net::DNS::RR::GPOS":"Net-DNS","XML::Simple":"XML-Simple","Crypt::Primes":"Crypt-Primes","Crypt::PRNG::ChaCha20":"CryptX","Plack::App::CGIBin":"Plack","Module::Provision":"Module-Provision","Apache2::SubRequest":"mod_perl","Kossy::BodyParser":"Kossy","SOAP::XMLSchema1999::Serializer":"SOAP-Lite","XML::LibXML::Common":"XML-LibXML","Valiant::Validator::OnlyOf":"Valiant","DBD::File::db":"DBI","XAO::PreLoad":"XAO-Web","Tk::DragDrop::Common":"Tk","Apache::Wyrd::Var":"Apache-Wyrd","Spoon::Hooks":"Spoon","Apache::Session::LDAP":"Apache-Session-LDAP","Tk::DragDrop::XDNDSite":"Tk","CPAN::Exception::RecursiveDependency::na":"CPAN","Pinto::Editor::Clip":"Pinto","Valiant::HTML::FormBuilder::Model":"Valiant","OS2::DLL":"perl","Crypt::Random":"Crypt-Random","IO::Uncompress::RawInflate":"IO-Compress","Zonemaster::Backend::RPCAPI":"Zonemaster-Backend","Mail::Mailer::smtps::pipe":"MailTools","Dancer2::Core::HTTP":"Dancer2","Image::Info::SVG::XMLLibXMLReader":"Image-Info","Apache::Session::Browseable::MySQL":"Apache-Session-Browseable","Jifty::DBI::Handle::Pg":"Jifty-DBI","Catalyst::Log":"Catalyst-Runtime","Dpkg::OpenPGP":"Dpkg","Jifty::Script::Model":"Jifty","PApp::Storable":"PApp","Legacy::DB::SyntenyIO":"GBrowse","MHonArc::UTF8::CP949":"MHonArc","Image::ExifTool::PSP":"Image-ExifTool","Apache::MP3::L10N::no":"Apache-MP3","Jifty::Test::WWW::Mechanize":"Jifty","Net::Server::Proto::SSL":"Net-Server","Mojolicious::Plugin::HeaderCondition":"Mojolicious","Pinto::Store":"Pinto","Moxy::Component::Context":"Moxy","Tk::Menu::Radiobutton":"Tk","Apache::PerlSections":"mod_perl","Jifty::Plugin::SetupWizard":"Jifty","XAO::DO::Web::FilloutForm":"XAO-Web","Apache::Wyrd::Datum::Varchar":"Apache-Wyrd","HTML::Entities":"HTML-Parser","Legacy::DB::SyntenyBlock":"GBrowse","CGI::Application::Plugin::AutoRunmode::FileDelegate":"CGI-Application-Plugin-AutoRunmode","PApp::DataRef::DB_row":"PApp","mro":"perl","ModPerl::MapUtil":"mod_perl","IO::Socket::SSL::OCSP_Resolver":"IO-Socket-SSL","Kossy::Assets":"Kossy","MojoMojo::Controller::JSON":"MojoMojo","Apache::Wyrd::Form::View":"Apache-Wyrd","Jifty::Plugin::I18N":"Jifty","Pinto::Action::Rename":"Pinto","Pod::Perldoc::ToText":"Pod-Perldoc","YAML::Any":"YAML","MHonArc::UTF8::KOI8_R":"MHonArc","Bundle::Image::Info::Everything":"Image-Info","Getopt::Std":"perl","Tk::Stdio":"PAR","Plack::Session::Store::Null":"Plack-Middleware-Session","Encode::Encoder":"Encode","Image::ExifTool::Real":"Image-ExifTool","SOAP::Transport::LOCAL::Client":"SOAP-Lite","Image::ExifTool::Palm":"Image-ExifTool","CPAN::CacheMgr":"CPAN","Mojolicious::Lite":"Mojolicious","POE::Component::IRC::Plugin::Proxy":"POE-Component-IRC","Image::ExifTool::Lang::ko":"Image-ExifTool","overload::numbers":"perl","XML::Twig::Notation_list":"XML-Twig","Image::Info::SVG":"Image-Info","Mojo::BaseUtil":"Mojolicious","Tk::Trace":"Tk","Archive::Zip::Member":"Archive-Zip","SOAP::XMLSchemaApacheSOAP::Deserializer":"SOAP-Lite","Mojo::DOM::Role::Analyzer":"Mojo-DOM-Role-Analyzer","Galileo::User":"Galileo","Bio::Graphics::Browser2::DataLoader::generic":"GBrowse","Apache::ASP::Date":"Apache-ASP","Imager::Font::Truetype":"Imager","Plack::Middleware::Recursive":"Plack","Symbol":"perl","Pinto::Action::Update":"Pinto","Valiant::Name":"Valiant","Catalyst::Plugin::Static":"Catalyst-Plugin-Static","CGI::Push":"CGI","Proc::Killall":"Proc-ProcessTable","Perlbal::Plugin::FlvStreaming":"Perlbal","Kelp::Generator":"Kelp","SOAP::Lite::Deserializer::XMLSchema2001":"SOAP-Lite","ExtUtils::ParseXS::Node::Sig":"ExtUtils-ParseXS","Imager::ExtUtils":"Imager","Lemonldap::NG::Portal::Lib::LazyLoadedConfiguration":"Lemonldap-NG-Portal","Apache2::FunctionTable":"mod_perl","MojoMojo::Formatter::GoogleSearch":"MojoMojo","Sys::Hostname":"perl","RPC::XML::int":"RPC-XML","File::Spec::Win32":"PathTools","Dancer::Handler::PSGI":"Dancer","DBD::Sponge::st":"DBI","POSIX::2008":"POSIX-2008","Dancer::Cookie":"Dancer","DBD::File::Table":"DBI","Mojo::Transaction::HTTP":"Mojolicious","Config::Model::Backend::Fstab":"Config-Model","Moxy::Plugin::DisableTableTag":"Moxy","Crypt::Digest::SHA384":"CryptX","Image::ExifTool::GIMP":"Image-ExifTool","Apache::SessionX::Manager":"Apache-SessionX","MHonArc::CharEnt::CP932":"MHonArc","ModPerl::BuildMM":"mod_perl","Apache::Constants":"mod_perl","Crypt::Cipher::SAFER_SK128":"CryptX","Jifty::Plugin::Config::Action::Config":"Jifty","Valiant::HTML::FormTags":"Valiant","ModPerl::WrapXS":"mod_perl","Encode::KR::2022_KR":"Encode","Apache2::Access":"mod_perl","File::Glob":"perl","Crypt::Digest::CHAES":"CryptX","CGI::Session::Driver::postgresql":"CGI-Session","Tk::MMutil":"Tk","subs":"perl","SOAP::Transport::IO":"SOAP-Lite","Imager::File::SGI":"Imager","overloading":"perl","Catalyst::EngineLoader":"Catalyst-Runtime","Net::SNMP::Security::Community":"Net-SNMP","Clipboard::Win32":"Clipboard","IPC::Run":"IPC-Run","MHonArc::UTF8::GB2312":"MHonArc","Pinto::Action::Register":"Pinto","LWP::Debug":"libwww-perl","Pinto::IndexCache":"Pinto","Cpanel::JSON::XS::Type":"Cpanel-JSON-XS","MIME::WordDecoder::ISO_8859":"MIME-tools","ModPerl::StructureMap":"mod_perl","Log::Any::Proxy::Test":"Log-Any","PApp::PCode":"PApp","Jifty::Plugin::Compat::Apache":"Jifty","Zonemaster::Backend::DB::PostgreSQL":"Zonemaster-Backend","Crypt::Perl::X509::Extension::ct_precert_poison":"Crypt-Perl","Apache::Session::Store::LDAP":"Apache-Session-LDAP","DBI::ProxyServer::st":"DBI","OS2::DLL::dll":"perl","Image::ExifTool::Lang::cs":"Image-ExifTool","MySQL::Admin::Config":"MySQL-Admin","Config::Model::Value::LayeredInclude":"Config-Model","Apache::Wyrd::Interfaces::Setter":"Apache-Wyrd","Mojolicious::Validator::Validation":"Mojolicious","Lemonldap::NG::Portal::Password::Base":"Lemonldap-NG-Portal","Image::ExifTool::Lang::pl":"Image-ExifTool","Net::OAuth::RequestTokenResponse":"Net-OAuth","Crypt::Random::Source::Factory":"Crypt-Random-Source","CGI::Application::Dispatch":"CGI-Application-Dispatch","OS2::ExtAttr":"perl","Crypt::Perl::ECDSA::Math":"Crypt-Perl","Elive::Connection":"Elive","Archive::Zip::BufferedFileHandle":"Archive-Zip","Crypt::Digest::RIPEMD128":"CryptX","PApp::DataRef":"PApp","Net::DNS::RR::DELEG":"Net-DNS","XAO::DO::Web::Mailer":"XAO-Web","Crypt::Perl::ECDSA::EC::Curve":"Crypt-Perl","PApp::DataRef::Scalar":"PApp","HTML::Perlinfo::Base":"HTML-Perlinfo","Jifty::Request::Mapper":"Jifty","Jifty::Plugin::Config":"Jifty","Lemonldap::NG::Portal::Plugins::Notifications":"Lemonldap-NG-Portal","warnings::register":"perl","Apache::ASP::CGI::Test":"Apache-ASP","XAO::PluginUtils":"XAO-Web","Kossy::Exception":"Kossy","Jifty::Plugin::Halo":"Jifty","Data::FormValidator::Constraints::Dates":"Data-FormValidator","App::Context::Cmd":"App-Context","sigtrap":"perl","YAML::Node":"YAML","Crypt::Mode::ECB":"CryptX","DBI::ProxyServer::dr":"DBI","Lemonldap::NG::Portal::Issuer::JitsiMeetTokens":"Lemonldap-NG-Portal","Dancer::Logger::Diag":"Dancer","Dancer2::Core::DSL":"Dancer2","MHonArc::UTF8::ISO8859_5":"MHonArc","GD::Image":"GD","Crypt::Digest::Keccak512":"CryptX","Mojo::UserAgent::Transactor":"Mojolicious","ExtUtils::MM_MacOS":"ExtUtils-MakeMaker","APR::BucketAlloc":"mod_perl","Crypt::Perl::X509::Extension::inhibitAnyPolicy":"Crypt-Perl","Dancer::Config":"Dancer","Tk::Pretty":"Tk","Image::ExifTool::H264":"Image-ExifTool","Template::Quick":"MySQL-Admin","Dancer2::Core::Role::StandardResponses":"Dancer2","Net::DNS::Header":"Net-DNS","Pinto::Target":"Pinto","Net::DNS::RR::HTTPS":"Net-DNS","Email::Address":"Email-Address","Jifty::CAS::Blob":"Jifty","Valiant::Errors":"Valiant","MHonArc::UTF8::GOST19768_87":"MHonArc","Apache2::RequestRec":"mod_perl","Lemonldap::NG::Portal::Password::Custom":"Lemonldap-NG-Portal","OS2::REXX::_SCALAR":"perl","Net::LDAP::ASN":"perl-ldap","Galileo::Command::dump":"Galileo","Dpkg::Changelog::Debian":"Dpkg","HTTP::Body":"HTTP-Body","Jifty::API":"Jifty","PApp::Event":"PApp","Tk::Menubutton":"Tk","Mojolicious::Plugin::TagHelpers":"Mojolicious","HTML::Filter":"HTML-Parser","Valiant::HTML::Component":"Valiant","SOAP::Header":"SOAP-Lite","Crypt::Perl::ECDSA::NIST":"Crypt-Perl","Encode::Byte":"Encode","Net::SNMP::Dispatcher":"Net-SNMP","Fake::Our":"Fake-Our","DBIx::Class::Valiant::Util::Exception::TooManyRows":"Valiant","Net::DNS::ZoneFile::Generator":"Net-DNS","App::Pinto::Command::delete":"Pinto","Dwarf":"Cmd-Dwarf","Config::Model::Backend::IniFile":"Config-Model","Lemonldap::NG::Portal::Password::DBI":"Lemonldap-NG-Portal","App::Service":"App-Context","Module::Provision::TraitFor::CPANDistributions":"Module-Provision","Catalyst::Action::Serialize::YAML::HTML":"Catalyst-Action-REST","PApp::Env":"PApp","Module::Provision::TraitFor::CreatingDistributions":"Module-Provision","Crypt::Digest::SHA512":"CryptX","ExtUtils::MM_Unix":"ExtUtils-MakeMaker","IO::Uncompress::Unzip":"IO-Compress","Mail::Field":"MailTools","ExtUtils::MM_Win32":"ExtUtils-MakeMaker","Crypt::DSA":"Crypt-DSA","Mojo::Cache":"Mojolicious","APR::Util":"mod_perl","Catalyst::DispatchType":"Catalyst-Runtime","t::BHK":"perl","Module::Provision::TraitFor::EnvControl":"Module-Provision","Class::Struct::Tie_ISA":"perl","Amiga::Exec":"perl","Sub::HandlesVia::HandlerLibrary::Array":"Sub-HandlesVia","MojoMojo::Schema::Result::Tag":"MojoMojo","Spoon::Cookie":"Spoon","Pinto::DifferenceEntry":"Pinto","LWP::UserAgent":"libwww-perl","MHonArc::CharEnt::VISCII":"MHonArc","File::DataClass::Storage::Any":"File-DataClass","Module::Provision::Config":"Module-Provision","Apache::ASP::Collection":"Apache-ASP","Lemonldap::NG::Portal::Captcha::SecurityImage":"Lemonldap-NG-Portal","DBIx::Class::Valiant::Result::HTML::FormFields":"Valiant","XAO::DO::Web::Action":"XAO-Web","Valiant::Validator::Unique":"Valiant","Bundle::DBD::mysql":"DBD-mysql","Net::Server::Daemonize":"Net-Server","Crypt::Perl::PKCS10::Attributes":"Crypt-Perl","Dancer::Request::Upload":"Dancer","Mojo::Cookie::Response":"Mojolicious","Mojo::Base":"Mojolicious","RPC::XML::i8":"RPC-XML","Catalyst::Action::Deserialize::JSON":"Catalyst-Action-REST","Mojo::Server::Morbo":"Mojolicious","Spoon::IndexList":"Spoon","MHonArc::CharEnt::ISO8859_15":"MHonArc","Crypt::Digest":"CryptX","Data::Entropy":"Data-Entropy","APR::Request::Param":"libapreq2","Lemonldap::NG::Portal::Register::Demo":"Lemonldap-NG-Portal","MHonArc::UTF8":"MHonArc","URI::jabber":"SOAP-Lite","Apache2::ServerRec":"mod_perl","Sub::HandlesVia::HandlerLibrary::String":"Sub-HandlesVia","MojoMojo::Schema::ResultSet::Tag":"MojoMojo","Dpkg::Getopt":"Dpkg","File::Spec::OS2":"PathTools","DBIx::Class::Valiant::Util::Exception":"Valiant","Plack::HTTPParser::PP":"Plack","Spoon::Registry":"Spoon","Apache::Wyrd::Site::GDButton":"Apache-Wyrd","Mite::App::Command::exec":"Mite","Zonemaster::Backend::Error::JsonError":"Zonemaster-Backend","bytes":"perl","CPAN::Distroprefs::Result::Fatal":"CPAN","Time::localtime":"perl","Mojo::JSON":"Mojolicious","Lemonldap::NG::Portal::Plugins::BasePasswordPolicy":"Lemonldap-NG-Portal","MHonArc::CharEnt::AppleCenteuro":"MHonArc","Lemonldap::NG::Portal::Password::REST":"Lemonldap-NG-Portal","SOAP::Packager::MIME":"SOAP-Lite","App::Context::NetServer":"App-Context","PApp::DataRef::Hash::Proxy":"PApp","Pinto::Difference":"Pinto","Jifty::ClassLoader":"Jifty","Dpkg::Vendor::Debian":"Dpkg","Pinto::Chrome::Net":"Pinto","Moped::Msg":"perl","Mojolicious::Command::Author::generate::plugin":"Mojolicious","Tk::ProgressBar":"Tk","CGI::Session::Driver::sqlite":"CGI-Session","Bundle::DBD::Pg":"DBD-Pg","Apache::Wyrd::Input::URLInput":"Apache-Wyrd","MHonArc::Encode":"MHonArc","DBI::ProxyServer":"DBI","DBIx::Custom::NotExists":"DBIx-Custom","Config::Model::CheckList":"Config-Model","My::Parameters":"SOAP-Lite","XML::LibXML::Number":"XML-LibXML","Valiant::HTML::Form":"Valiant","Apache::Wyrd::Defaults":"Apache-Wyrd","Mojo::Server::Daemon":"Mojolicious","WebService::Xero":"WebService-Xero","Moxy::Plugin::FlashUseImgTag":"Moxy","Tk::DialogBox":"Tk","Imager::Font::Image":"Imager","Apache::Framework::App":"App-Context","Imager::Filter::Flines":"Imager","MojoMojo::Controller::Jsrpc":"MojoMojo","Tk::Event::IO":"Tk","Net::DNS::RR::RP":"Net-DNS","Test::Simply":"Fake-Our","Mite::MakeMaker":"Mite","Mojo::Content::MultiPart":"Mojolicious","Mojo::DOM":"Mojolicious","Jifty::Plugin::Authentication::Password::Action::Signup":"Jifty","CPAN::Checksums":"CPAN-Checksums","Net::DNS::RR::CDNSKEY":"Net-DNS","Sub::HandlesVia::Toolkit::Moo":"Sub-HandlesVia","MHonArc::UTF8::ISO8859_16":"MHonArc","Compress::LZ4":"Compress-LZ4","DBM_Filter":"perl","MojoMojo::Formatter::Comment":"MojoMojo","Spreadsheet::ParseExcel::SaveParser::Worksheet":"Spreadsheet-ParseExcel","Log::Any::Proxy::Null":"Log-Any","Net::DNS::RR::HIP":"Net-DNS","Crypt::Perl::X509::Extension":"Crypt-Perl","Image::ExifTool::Minolta":"Image-ExifTool","Imager::File::ICO":"Imager","Dpkg::Deps::Union":"Dpkg","Crypt::Perl::X::UnknownJWKkty":"Crypt-Perl","Perlbal::TCPListener":"Perlbal","MojoMojo::Schema::Result::RoleMember":"MojoMojo","XAO::DO::Context":"XAO-Web","MySQL::Admin::GUI":"MySQL-Admin","B::Op_private":"perl","Mail::Audit::MimeEntity":"Mail-Audit","Config::Model::Exception::Syntax":"Config-Model","Jifty::View::Static::Handler":"Jifty","My::Chat":"SOAP-Lite","ExtUtils::MakeMaker::version::vpp":"ExtUtils-MakeMaker","Bio::Graphics::Browser2::SendMail":"GBrowse","Crypt::CBC::PBKDF::randomiv":"Crypt-CBC","XAO::DO::Web::SetArg":"XAO-Web","Encode::MIME::Header::ISO_2022_JP":"Encode","Devel::PatchPerl::Plugin::General":"App-perlall","Proc::Daemon":"Proc-Daemon","Valiant::Validator::Presence":"Valiant","Apache2::Connection":"mod_perl","DBI::Profile":"DBI","Mojolicious::Command::eval":"Mojolicious","ModPerl::Registry":"mod_perl","Image::ExifTool::Geolocation":"Image-ExifTool","DBIx::Otogiri":"Otogiri","Pinto::RevisionWalker":"Pinto","Tk::Text":"Tk","Pinto::Server::Responder::File":"Pinto","Bio::Graphics::Browser2::DataLoader::bed":"GBrowse","Encode::Unicode::UTF7":"Encode","Bio::Graphics::Browser2::Realign":"GBrowse","Pinto::DistributionSpec":"Pinto","Capture::Tiny":"Capture-Tiny","Crypt::Random::Source::Base::Handle":"Crypt-Random-Source","XML::Atom::Thing":"XML-Atom","DBIx::Class::Valiant::Util::Exception::BadParameters":"Valiant","Crypt::Cipher::XTEA":"CryptX","Apache::Wyrd::Site::Index":"Apache-Wyrd","MHonArc::CharEnt::CP1255":"MHonArc","DBD::Gofer::Policy::rush":"DBI","Jifty::DBI::Filter::Truncate":"Jifty-DBI","Encode::CJKConstants":"Encode","POE::Filter::IRC":"POE-Component-IRC","File::Spec::Epoc":"PathTools","Jifty::Web::Session":"Jifty","Tk::Menubar":"Tk","Net::LDAP::Extension::SetPassword":"perl-ldap","PerlIO::scalar":"perl","Crypt::CBC::PBKDF::opensslv2":"Crypt-CBC","Dpkg::Compression::FileHandle":"Dpkg","Lemonldap::NG::Portal::Plugins::CheckUser":"Lemonldap-NG-Portal","RT::Authen::ExternalAuth":"RT-Authen-ExternalAuth","B::Showlex":"perl","Apache::Wyrd::View":"Apache-Wyrd","Crypt::Perl::PKCS10::ASN1":"Crypt-Perl","Catalyst::Action::Deserialize::Callback":"Catalyst-Action-REST","Dancer2::Serializer::Mutable":"Dancer2","Dancer2::Serializer::JSON":"Dancer2","Moxy::Plugin::Hosts":"Moxy","Pinto::Target::Package":"Pinto","Lemonldap::NG::Portal::Auth::Null":"Lemonldap-NG-Portal","Mojo::Reactor::EV":"Mojolicious","Galileo::Menu":"Galileo","Dancer2::Logger::Diag":"Dancer2","IPC::Open3":"perl","Net::SNMP":"Net-SNMP","Image::ExifTool::Lang::ja":"Image-ExifTool","DBD::Mem::Table":"DBI","Lemonldap::NG::Portal::Plugins::AdaptativeAuthenticationLevel":"Lemonldap-NG-Portal","Apache::Options":"mod_perl","IO::Compress::Adapter::Deflate":"IO-Compress","XML::LibXML::CDATASection":"XML-LibXML","IO::Compress::Bzip2":"IO-Compress","Image::ExifTool::Kodak":"Image-ExifTool","MHonArc::UTF8::KOI8_F":"MHonArc","Amiga::ARexx::Msg":"perl","Dancer::Handler::Debug":"Dancer","Pinto::Action::Unlock":"Pinto","Lemonldap::NG::Portal::Issuer::OpenIDConnect":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Auth::Choice":"Lemonldap-NG-Portal","Bundle::Image::Info::XPM":"Image-Info","Crypt::Perl::X::InvalidJWK":"Crypt-Perl","XML::LibXML::Boolean":"XML-LibXML","MojoMojo::Schema::Result::Photo":"MojoMojo","Image::ExifTool::Red":"Image-ExifTool","Net::OAuth::XauthAccessTokenRequest":"Net-OAuth","POE::Component::IRC::Plugin::Logger":"POE-Component-IRC","Dpkg::Vendor::Default":"Dpkg","Mojo::Server::Morbo::Backend":"Mojolicious","Config::Model::DumpAsData":"Config-Model","PaletteModify":"Perlbal","LWP::Protocol::http":"libwww-perl","Lemonldap::NG::Portal::UserDB::AD":"Lemonldap-NG-Portal","MojoMojo::Controller::Journal":"MojoMojo","Dpkg::BuildDriver::DebianRules":"Dpkg","CPAN::Queue":"CPAN","MojoMojo":"MojoMojo","Mail::Mailer::testfile::pipe":"MailTools","Net::Server":"Net-Server","Mojo::Asset::File":"Mojolicious","Crypt::Perl::X::ECDSA::NoCurveForNISTName":"Crypt-Perl","HTML::EP::Parser":"HTML-EP","Dpkg::Build::Types":"Dpkg","Apache::Session::Browseable::Store::File":"Apache-Session-Browseable","MHonArc::UTF8::ISO8859_10":"MHonArc","Image::ExifTool::MIE":"Image-ExifTool","ExtUtils::ParseXS::Node":"ExtUtils-ParseXS","IO::Compress::Adapter::Bzip2":"IO-Compress","Dancer2::Core::Role::HasLocation":"Dancer2","Config::Model::TypeConstraints":"Config-Model","Catalyst::Response::Writer":"Catalyst-Runtime","Catalyst::ActionRole::Scheme":"Catalyst-Runtime","Image::ExifTool::Samsung":"Image-ExifTool","Encode::CN::HZ":"Encode","Apache::Session::Browseable::Store::Redis":"Apache-Session-Browseable","Image::ExifTool::M2TS":"Image-ExifTool","Catalyst::ScriptRole":"Catalyst-Runtime","Mojolicious::Command":"Mojolicious","Dancer::Serializer::YAML":"Dancer","Jifty::Web::Form::Field::Text":"Jifty","Dancer2::Core::Error":"Dancer2","APR::Request::CGI":"libapreq2","SVG::Sparkline::Utils":"SVG-Sparkline","Bio::Graphics::Browser2::Render::HTML":"GBrowse","Plack::Request":"Plack","LWP::Simple":"libwww-perl","MHonArc::CharEnt::AppleThai":"MHonArc","Net::LDAPS":"perl-ldap","Tk::ColorSelect":"Tk","Lemonldap::NG::Portal::Plugins::CheckHIBP":"Lemonldap-NG-Portal","Catalyst::Action::Deserialize":"Catalyst-Action-REST","Image::ExifTool::Sony":"Image-ExifTool","Bio::Graphics::Browser2::RenderPanels":"GBrowse","Config::Model::Exception::WrongType":"Config-Model","Image::ExifTool::TagInfoXML":"Image-ExifTool","Net::LDAP::Constant":"perl-ldap","Image::ExifTool::AES":"Image-ExifTool","Thread":"perl","Lemonldap::NG::Portal::Auth::CAS":"Lemonldap-NG-Portal","Perlbal::Plugin::Palimg":"Perlbal","Bio::Graphics::Browser2::Shellwords":"GBrowse","Tk::NoteBook":"Tk","SOAP::Packager":"SOAP-Lite","Image::ExifTool::PCAP":"Image-ExifTool","File::DataClass::Exception":"File-DataClass","Jifty::Plugin::Authentication::Password::View":"Jifty","Kelp::Request":"Kelp","Valiant::Validator::Length":"Valiant","Socket":"Socket","Kelp::Test":"Kelp","MIME::Parser::Filer":"MIME-tools","Apache::ASP::Lang::PerlScript":"Apache-ASP","MojoMojo::Schema::Base::ResultSet":"MojoMojo","Valiant::Proxy":"Valiant","Bundle::PlRPC":"PlRPC","Config::Model::Exception::Any":"Config-Model","Image::ExifTool::Lang::fr":"Image-ExifTool","Crypt::Cipher::MULTI2":"CryptX","Tk::DragDrop::Win32Drop":"Tk","Mojolicious::Command::daemon":"Mojolicious","Catalyst::Action::DeserializeMultiPart":"Catalyst-Action-REST","Pinto::Action::Clean":"Pinto","ExtUtils::MM_AIX":"ExtUtils-MakeMaker","Valiant::Filter::HtmlEscape":"Valiant","Pinto::Chrome::Term":"Pinto","Apache::MP3::L10N::ms":"Apache-MP3","Dancer2::FileUtils":"Dancer2","B::OBJECT":"perl","CGI::apacheSSI::Local":"CGI-apacheSSI","XAO::testcases::Web::base":"XAO-Web","Image::ExifTool::JPEGDigest":"Image-ExifTool","ops":"perl","Imager::TrimColorList":"Imager","Image::ExifTool::EXE":"Image-ExifTool","File::DataClass::Result":"File-DataClass","Spoon":"Spoon","Net::OpenID::ClaimedIdentity":"Net-OpenID-Consumer","DBD::Mem::st":"DBI","Pinto::Server::Router":"Pinto","Crypt::Perl::PK":"Crypt-Perl","Image::Info::GIF":"Image-Info","XML::LibXML::SAX::Generator":"XML-LibXML","Image::ExifTool::Lang::zh_tw":"Image-ExifTool","Apache2::ServerUtil":"mod_perl","Net::OAuth::YahooAccessTokenRefreshRequest":"Net-OAuth","Lemonldap::NG::Portal::Main::Plugin":"Lemonldap-NG-Portal","ModPerl::Global":"mod_perl","Crypt::Random::Provider::devrandom":"Crypt-Random","Dancer::Test":"Dancer","Apache::Wyrd::Site::MySQLIndex":"Apache-Wyrd","XML::LibXML::RelaxNG":"XML-LibXML","Dancer::Continuation::Halted":"Dancer","Apache::Wyrd::Bot":"Apache-Wyrd","Catalyst::Script::Server":"Catalyst-Runtime","VMS::DCLsym":"perl","Mojo::Date":"Mojolicious","MHonArc::UTF8::ISO8859_15":"MHonArc","Crypt::Mac::BLAKE2b":"CryptX","Dpkg::OpenPGP::Backend":"Dpkg","App::japerl":"App-japerl","Bundle::Image::Info::XBM":"Image-Info","Mail::Mailer":"MailTools","Apache::Session::Browseable::LDAP":"Apache-Session-Browseable","Tk::Pane":"Tk","MHonArc::CharEnt::AppleTurkish":"MHonArc","Net::OpenID::Association":"Net-OpenID-Consumer","Plack::Middleware::ContentMD5":"Plack"},"meta":{"commit":"165ea3314be76abd499cfa4d0c58d6f9b144b1c6","epoch":1747881158,"date":"Thu May 22 02:32:38 2025","generator":"util/generate","repo":"https://github.com/briandfoy/cpan-security-advisory.git"},"dists":{"HTML-StripScripts":{"main_module":"HTML::StripScripts","versions":[{"version":"0.01","date":"2003-03-30T10:08:51"},{"date":"2003-07-25T18:13:42","version":"0.02"},{"version":"0.03","date":"2004-04-27T16:45:34"},{"version":"0.90","date":"2007-05-28T11:57:07"},{"date":"2007-05-28T12:31:03","version":"0.99"},{"date":"2007-05-29T13:15:46","version":"0.991"},{"date":"2007-06-05T12:44:56","version":"1.00"},{"version":"1.01","date":"2007-10-22T14:30:52"},{"version":"1.02","date":"2007-10-22T15:47:44"},{"version":"1.03","date":"2007-10-22T17:21:36"},{"date":"2007-11-16T17:53:46","version":"1.04"},{"date":"2009-11-05T10:25:59","version":"1.05"},{"version":"1.06","date":"2016-05-12T09:44:35"}],"advisories":[{"id":"CPANSA-HTML-StripScripts-2023-24038","cves":["CVE-2023-24038"],"reported":"2023-01-21","fixed_versions":[],"distribution":"HTML-StripScripts","description":"The HTML-StripScripts module through 1.06 for Perl allows _hss_attval_style ReDoS because of catastrophic backtracking for HTML content with certain style attributes.\n","severity":"high","references":["https://github.com/clintongormley/perl-html-stripscripts/issues/3","https://lists.debian.org/debian-lts-announce/2023/01/msg00036.html","https://www.debian.org/security/2023/dsa-5339"],"affected_versions":["<=1.06"]}]},"Catalyst-Controller-Combine":{"main_module":"Catalyst::Controller::Combine","versions":[{"date":"2009-07-11T17:58:25","version":"0.06"},{"version":"0.07","date":"2009-07-13T06:49:00"},{"date":"2009-10-24T12:48:21","version":"0.08"},{"version":"0.09","date":"2010-03-13T19:31:13"},{"version":"0.10","date":"2010-03-27T18:44:05"},{"date":"2010-06-21T20:47:02","version":"0.12"},{"date":"2011-07-28T19:53:12","version":"0.13"},{"date":"2012-02-20T20:59:00","version":"0.14"},{"date":"2012-05-04T10:43:12","version":"0.15"}],"advisories":[{"references":["https://metacpan.org/changes/distribution/Catalyst-Controller-Combine"],"affected_versions":["<0.12"],"id":"CPANSA-Catalyst-Controller-Combine-2010-01","fixed_versions":[">=0.12"],"reported":"2010-05-21","cves":[],"description":"Allows to use url-encoded path-parts to crawl along the file system and read files outside the intended directory.\n","distribution":"Catalyst-Controller-Combine"}]},"Spreadsheet-ParseExcel":{"versions":[{"version":"0.06","date":"2000-10-06T00:33:12"},{"date":"2000-11-18T03:01:33","version":"0.07"},{"date":"2000-11-24T23:59:57","version":"0.08"},{"version":"0.09","date":"2000-12-15T02:58:39"},{"date":"2001-01-16T00:27:35","version":"0.10"},{"date":"2001-01-31T15:09:13","version":"0.11"},{"date":"2001-02-05T11:37:49","version":"0.12"},{"version":"0.13","date":"2001-02-22T22:35:17"},{"date":"2001-03-06T02:14:24","version":"0.15"},{"date":"2001-03-07T21:50:33","version":"0.16"},{"date":"2001-03-12T23:08:09","version":"0.17"},{"date":"2001-03-17T07:39:42","version":"0.18"},{"date":"2001-03-26T11:41:43","version":"0.19"},{"version":"0.20","date":"2001-03-30T11:22:58"},{"version":"0.201","date":"2001-04-11T00:12:29"},{"date":"2001-04-11T00:17:15","version":"v0.20.1"},{"version":"0.21","date":"2001-04-28T02:18:17"},{"version":"v0.21.1","date":"2001-04-29T05:37:04"},{"version":"v0.21.2","date":"2001-05-01T07:23:55"},{"date":"2001-05-05T09:46:39","version":"0.22"},{"date":"2001-05-15T22:20:34","version":"v0.22.1"},{"version":"v0.22.2","date":"2001-05-24T22:12:58"},{"version":"v0.22.3","date":"2001-06-05T22:21:24"},{"date":"2001-06-21T21:38:06","version":"0.23"},{"version":"0.2301","date":"2001-06-26T03:05:48"},{"version":"0.24","date":"2001-07-05T10:44:34"},{"version":"0.2402","date":"2001-07-13T10:51:35"},{"version":"0.2403","date":"2001-07-24T21:45:07"},{"version":"0.2404","date":"2001-12-06T22:01:45"},{"version":"0.2405","date":"2002-01-28T22:38:34"},{"date":"2002-04-07T22:20:17","version":"0.2406"},{"version":"0.2407","date":"2002-04-24T13:05:42"},{"date":"2002-05-09T15:05:41","version":"0.25"},{"version":"0.26","date":"2002-06-05T20:57:29"},{"date":"2002-07-13T22:41:34","version":"0.2601"},{"version":"0.2602","date":"2002-07-16T02:07:27"},{"version":"0.2603","date":"2004-05-30T01:51:09"},{"date":"2006-09-11T09:15:23","version":"0.27_01"},{"date":"2006-09-12T20:55:36","version":"0.27_02"},{"version":"0.27_03","date":"2006-11-02T16:44:10"},{"version":"0.27","date":"2007-01-03T15:48:01"},{"date":"2007-01-07T17:20:30","version":"0.28"},{"date":"2007-03-29T23:21:14","version":"0.29"},{"date":"2007-03-31T15:33:28","version":"0.30"},{"date":"2007-05-03T02:21:13","version":"0.31"},{"version":"0.32","date":"2007-05-05T03:56:46"},{"date":"2008-09-07T07:47:07","version":"0.33"},{"version":"0.40","date":"2008-10-24T00:05:35"},{"date":"2008-10-24T00:18:27","version":"0.33"},{"version":"0.42","date":"2009-01-01T20:42:10"},{"version":"0.43","date":"2009-01-08T02:06:27"},{"version":"0.44","date":"2009-01-09T03:37:10"},{"date":"2009-01-14T02:19:46","version":"0.45"},{"version":"0.46","date":"2009-01-20T00:34:23"},{"date":"2009-01-22T00:39:18","version":"0.47"},{"version":"0.48","date":"2009-01-23T07:07:04"},{"version":"0.49","date":"2009-01-24T01:19:12"},{"date":"2009-08-18T23:30:07","version":"0.50"},{"version":"0.51","date":"2009-08-19T22:08:26"},{"date":"2009-08-21T18:09:01","version":"0.52"},{"version":"0.53","date":"2009-08-24T23:06:49"},{"version":"0.54","date":"2009-08-25T20:24:31"},{"version":"0.55","date":"2009-09-30T06:26:08"},{"date":"2009-12-10T00:23:50","version":"0.56"},{"date":"2010-01-24T19:18:56","version":"0.57"},{"date":"2010-09-17T18:09:07","version":"0.58"},{"version":"0.59","date":"2011-04-06T19:13:26"},{"date":"2014-02-26T19:58:52","version":"0.60"},{"version":"0.61","date":"2014-03-04T18:56:46"},{"date":"2014-03-05T17:16:00","version":"0.62"},{"version":"0.63","date":"2014-03-07T20:47:21"},{"version":"0.64","date":"2014-03-11T17:22:13"},{"date":"2014-03-18T20:47:23","version":"0.65"},{"date":"2023-12-29T01:14:58","version":"0.66"}],"main_module":"Spreadsheet::ParseExcel","advisories":[{"severity":null,"references":["http://www.openwall.com/lists/oss-security/2023/12/29/4","https://github.com/jmcnamara/spreadsheet-parseexcel/blob/c7298592e102a375d43150cd002feed806557c15/lib/Spreadsheet/ParseExcel/Utility.pm#L171","https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md","https://https://github.com/haile01/perl_spreadsheet_excel_rce_poc","https://https://metacpan.org/dist/Spreadsheet-ParseExcel","https://https://www.cve.org/CVERecord?id=CVE-2023-7101","https://lists.debian.org/debian-lts-announce/2023/12/msg00025.html"],"affected_versions":["<0.66"],"id":"CPANSA-Spreadsheet-ParseExcel-2023-7101","reported":"2023-12-24","cves":["CVE-2023-7101"],"fixed_versions":[">=0.66"],"distribution":"Spreadsheet-ParseExcel","description":"Spreadsheet::ParseExcel version 0.65 is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary code execution (ACE) vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the Excel parsing logic.\n"}]},"Net-Netmask":{"advisories":[{"id":"CPANSA-Net-Netmask-2021-01","reported":"2021-03-29","fixed_versions":[">=2.0000"],"cves":["CVE-2021-29424"],"description":"The Net::Netmask module before 2.0000 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.\n","distribution":"Net-Netmask","affected_versions":["<2.0000"],"references":["https://security.netapp.com/advisory/ntap-20210604-0007/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBJVLXJSWN6DKSF5ADUEERI6M23R3GGP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JF4CYIZELC3NISB3RMV4OCI4GYBC557B/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y7JIPQAY5OZ5D3DA7INQILU7SGHTHMWB/","https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/","https://metacpan.org/changes/distribution/Net-Netmask#L11-22"]}],"versions":[{"version":"1.0","date":"1998-06-08T05:38:00"},{"date":"1998-06-08T22:46:00","version":"1.2"},{"date":"1998-06-25T17:03:00","version":"1.3"},{"version":"1.4","date":"1998-11-29T20:50:00"},{"version":"1.6","date":"1999-03-28T03:32:00"},{"date":"1999-09-15T17:44:00","version":"1.7"},{"date":"1999-09-21T00:53:00","version":"1.8"},{"date":"2001-05-16T09:18:57","version":"1.9"},{"version":"1.9001","date":"2001-09-30T06:14:00"},{"date":"2001-11-12T18:20:00","version":"1.9002"},{"version":"1.9003","date":"2003-05-27T15:36:25"},{"date":"2003-05-29T03:36:30","version":"1.9004"},{"version":"1.9005","date":"2003-11-29T22:49:00"},{"version":"1.9006","date":"2003-12-05T22:02:00"},{"version":"1.9007","date":"2004-01-02T23:56:00"},{"date":"2004-04-06T20:15:00","version":"1.9008"},{"version":"1.9009","date":"2004-04-12T21:05:00"},{"date":"2004-05-31T19:48:00","version":"1.9011"},{"version":"1.9012","date":"2005-05-19T15:45:00"},{"version":"1.9013","date":"2006-09-06T19:27:00"},{"version":"1.9014","date":"2006-10-14T01:20:00"},{"date":"2006-11-30T21:06:00","version":"1.9015"},{"date":"2011-03-23T04:41:06","version":"1.9016"},{"version":"1.9017","date":"2013-09-21T01:56:56"},{"date":"2013-09-27T01:25:15","version":"1.9018"},{"date":"2013-10-02T00:42:56","version":"1.9019"},{"version":"1.9021","date":"2014-07-18T00:15:30"},{"version":"1.9022","date":"2015-05-05T03:36:33"},{"version":"1.9100","date":"2018-06-04T04:39:04"},{"version":"1.9101","date":"2018-06-05T01:21:39"},{"version":"1.9102","date":"2018-06-18T16:35:20"},{"version":"1.9103","date":"2018-06-18T21:31:04"},{"date":"2018-07-27T04:52:04","version":"1.9104"},{"version":"1.9104","date":"2018-07-27T23:03:36"},{"date":"2021-03-29T17:24:43","version":"2.0000"},{"version":"2.0001","date":"2021-03-29T19:31:52"},{"date":"2022-08-31T18:09:46","version":"2.0002"},{"date":"2025-05-17T15:27:37","version":"2.0003"}],"main_module":"Net::Netmask"},"Kossy":{"versions":[{"date":"2011-11-29T08:45:37","version":"0.05"},{"version":"0.06","date":"2012-01-05T01:58:20"},{"date":"2012-02-17T03:11:05","version":"0.07"},{"date":"2012-04-24T10:06:21","version":"0.08"},{"version":"0.09","date":"2012-05-17T08:52:24"},{"version":"0.10","date":"2012-06-19T02:16:23"},{"version":"0.11","date":"2012-07-24T12:51:12"},{"date":"2012-08-24T09:24:50","version":"0.12"},{"date":"2012-12-05T02:26:49","version":"0.13"},{"date":"2013-03-14T13:28:06","version":"0.14"},{"date":"2013-04-04T15:38:05","version":"0.14"},{"date":"2013-07-16T04:32:43","version":"0.16"},{"version":"0.17","date":"2013-07-16T04:40:39"},{"version":"0.18","date":"2013-08-08T07:08:09"},{"version":"0.19","date":"2013-08-30T07:04:23"},{"date":"2013-10-09T06:49:21","version":"0.20"},{"date":"2013-10-10T06:42:16","version":"0.21"},{"version":"0.22","date":"2013-10-15T02:46:09"},{"version":"0.23","date":"2013-10-21T05:21:48"},{"date":"2013-10-31T04:44:36","version":"0.24"},{"version":"0.25","date":"2013-11-06T02:29:36"},{"date":"2013-11-12T02:17:30","version":"0.26"},{"date":"2013-11-12T05:48:05","version":"0.27"},{"version":"0.28","date":"2013-11-28T01:33:03"},{"date":"2014-02-12T04:48:29","version":"0.30"},{"version":"0.31","date":"2014-02-12T04:56:17"},{"version":"0.32","date":"2014-02-19T06:55:53"},{"date":"2014-02-19T16:20:13","version":"0.33"},{"date":"2014-02-19T17:19:43","version":"0.34"},{"version":"0.34","date":"2014-05-28T15:13:06"},{"date":"2014-05-28T15:51:34","version":"0.34"},{"date":"2014-05-28T16:50:27","version":"0.37"},{"date":"2014-05-29T06:37:53","version":"0.38"},{"date":"2014-10-20T05:47:47","version":"0.39"},{"date":"2016-07-19T15:04:31","version":"0.40"},{"version":"0.50","date":"2021-08-26T13:50:58"},{"date":"2021-09-16T12:04:39","version":"0.60"},{"version":"0.61","date":"2023-11-06T14:27:18"},{"version":"0.62","date":"2023-11-09T08:57:59"},{"date":"2023-11-13T02:24:42","version":"0.63"}],"main_module":"Kossy","advisories":[{"severity":null,"references":["https://github.com/kazeburo/Kossy/pull/16","https://metacpan.org/dist/Kossy/changes"],"affected_versions":["<0.60"],"id":"CPANSA-Kossy-2021-01","description":"Flaw in defense from JSON hijacking.\n","distribution":"Kossy","reported":"2021-08-29","cves":["CVE-2021-47157"],"fixed_versions":[">=0.60"]}]},"Sub-HandlesVia":{"main_module":"Sub::HandlesVia","versions":[{"version":"0.001","date":"2020-01-21T12:20:29"},{"version":"0.002","date":"2020-01-21T12:44:10"},{"date":"2020-01-21T21:31:54","version":"0.003"},{"date":"2020-01-22T20:46:52","version":"0.004"},{"date":"2020-01-23T12:15:51","version":"0.005"},{"version":"0.006","date":"2020-01-23T12:57:19"},{"date":"2020-01-25T18:32:49","version":"0.007"},{"version":"0.008_000","date":"2020-01-26T21:21:53"},{"version":"0.008_001","date":"2020-01-26T23:51:45"},{"date":"2020-01-27T01:42:52","version":"0.008_002"},{"version":"0.008_003","date":"2020-01-27T08:53:01"},{"date":"2020-01-27T10:55:08","version":"0.009"},{"version":"0.010","date":"2020-01-27T14:35:32"},{"date":"2020-01-27T20:50:11","version":"0.011"},{"version":"0.012","date":"2020-02-02T19:19:39"},{"date":"2020-02-04T23:25:52","version":"0.013"},{"version":"0.014","date":"2020-08-25T12:50:04"},{"date":"2020-09-12T14:08:39","version":"0.015"},{"version":"0.016","date":"2020-09-20T16:31:29"},{"date":"2022-06-11T11:23:50","version":"0.017"},{"version":"0.018","date":"2022-06-11T14:29:41"},{"version":"0.019","date":"2022-06-11T16:47:08"},{"date":"2022-06-11T20:23:02","version":"0.020"},{"version":"0.021","date":"2022-06-12T17:24:14"},{"date":"2022-06-14T16:04:34","version":"0.022"},{"date":"2022-06-15T01:20:36","version":"0.023"},{"date":"2022-06-15T14:42:36","version":"0.024"},{"date":"2022-06-16T10:36:27","version":"0.025"},{"version":"0.026","date":"2022-06-29T23:39:10"},{"version":"0.027","date":"2022-06-30T00:10:02"},{"version":"0.028","date":"2022-07-01T23:17:41"},{"version":"0.029","date":"2022-07-09T18:26:58"},{"version":"0.030","date":"2022-07-09T18:32:11"},{"date":"2022-07-09T19:48:20","version":"0.031"},{"version":"0.032","date":"2022-07-12T19:15:21"},{"date":"2022-08-05T15:26:32","version":"0.033"},{"version":"0.034","date":"2022-08-07T14:36:37"},{"version":"0.035","date":"2022-08-12T14:45:11"},{"date":"2022-08-26T14:46:58","version":"0.036"},{"version":"0.037","date":"2022-09-26T08:48:59"},{"date":"2022-10-21T14:29:19","version":"0.038"},{"version":"0.039","date":"2022-10-26T10:30:49"},{"date":"2022-10-27T12:45:21","version":"0.040"},{"date":"2022-10-29T15:58:04","version":"0.041"},{"version":"0.042","date":"2022-10-30T12:28:45"},{"version":"0.043","date":"2022-10-31T11:04:11"},{"date":"2022-10-31T18:24:28","version":"0.044"},{"version":"0.045","date":"2022-11-08T18:45:23"},{"date":"2022-12-16T16:02:25","version":"0.046"},{"date":"2023-04-05T21:51:07","version":"0.050000"},{"date":"2025-03-23T18:30:54","version":"0.050001"},{"version":"0.050002","date":"2025-03-31T11:34:28"}],"advisories":[{"reported":"2025-04-01","fixed_versions":[">=0.050002"],"cves":["CVE-2025-30673"],"distribution":"Sub-HandlesVia","description":"Sub::HandlesVia for Perl before 0.050002 allows untrusted code from the current working directory ('.') to be loaded similar to CVE-2016-1238. If an attacker can place a malicious file in current working directory, it may be loaded instead of the intended file, potentially leading to arbitrary code execution. Sub::HandlesVia uses Mite to produce the affected code section due to CVE-2025-30672","id":"CPANSA-Sub-HandlesVia-2025-30673","affected_versions":["<0.050002"],"references":["https://blogs.perl.org/users/todd_rinaldo/2016/11/what-happened-to-dot-in-inc.html","https://metacpan.org/dist/Sub-HandlesVia/changes#L12","https://metacpan.org/release/TOBYINK/Sub-HandlesVia-0.050001/source/lib/Sub/HandlesVia/Mite.pm#L114"],"severity":null}]},"Net-Dropbear":{"main_module":"Net::Dropbear","versions":[{"date":"2015-11-03T18:31:23","version":"0.01"},{"date":"2015-11-04T04:17:39","version":"0.02"},{"version":"0.03","date":"2015-11-05T06:49:56"},{"version":"0.04","date":"2015-11-07T03:40:31"},{"version":"0.06","date":"2015-11-29T00:37:40"},{"date":"2016-01-02T05:57:50","version":"0.07"},{"version":"0.08","date":"2016-08-04T05:36:45"},{"version":"0.09","date":"2016-08-08T05:56:46"},{"version":"0.10","date":"2016-08-10T05:05:32"},{"version":"0.11","date":"2020-03-17T04:05:13"},{"version":"0.12","date":"2020-03-20T02:33:34"},{"version":"0.13","date":"2020-03-21T14:51:53"},{"version":"0.14","date":"2021-05-28T04:07:12"},{"date":"2022-07-01T04:48:35","version":"0.15"},{"version":"0.16","date":"2022-07-08T03:18:20"}],"advisories":[{"comment":"From the author: \"I have reviewed Dropbear's usage of libtomcrypt, and the function in question for CVE-2019-17362, der_decode_utf8_string, is not used in Dropbear. None of the DER parsing from libtomcrypt is used in Dropbear at all, I have confirmed that the flag to include it is not set, and confirmed that the resultant Dropbear.so that is built by Net::Dropbear does not include any of the der_* symbols.\"\n","severity":"critical","embedded_vulnerability":{"affected_versions":"<0","name":"libtomcrypt","distributed_version":"1.8.2"},"id":"CPANSA-Net-Dropbear-2019-17362","distribution":"Net-Dropbear","description":"In LibTomCrypt through 1.18.2, the der_decode_utf8_string function (in der_decode_utf8_string.c) does not properly detect certain invalid UTF-8 sequences. This allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) or read information from other memory locations via carefully crafted DER-encoded data.\n","fixed_versions":[">0"],"reported":"2019-10-09","cves":["CVE-2019-17362"],"references":["https://github.com/atrodo/Net-Dropbear/issues/6","https://github.com/libtom/libtomcrypt/pull/508","https://github.com/libtom/libtomcrypt/issues/507","https://vuldb.com/?id.142995","https://lists.debian.org/debian-lts-announce/2019/10/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00020.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00041.html"],"affected_versions":["<0"]}]},"Plack":{"advisories":[{"fixed_versions":[">=1.0034"],"reported":"2015-02-02","cves":[],"description":"Fixed a possible directory traversal with Plack::App::File on Win32.\n","distribution":"Plack","id":"CPANSA-Plack-2015-0202","affected_versions":["<1.0034"],"references":[]},{"distribution":"Plack","description":"Plack::App::File would previously strip trailing slashes off provided paths. This in combination with the common pattern of serving files with Plack::Middleware::Static could allow an attacker to bypass a whitelist of generated files\n","fixed_versions":[">=1.0031"],"reported":"2014-08-01","cves":[],"id":"CPANSA-Plack-2014-0801","affected_versions":["<1.0031"],"references":["https://github.com/plack/Plack/pull/446"]},{"affected_versions":["<1.0016"],"references":[],"cves":[],"reported":"2013-01-31","fixed_versions":[">=1.0016"],"distribution":"Plack","description":"Fixed directory traversal bug in Plack::App::File on win32 environments\n","id":"CPANSA-Plack-2013-0131"}],"versions":[{"date":"2009-10-13T07:21:14","version":"0.9000"},{"version":"0.9001","date":"2009-10-13T07:59:20"},{"date":"2009-10-14T18:28:32","version":"0.9002"},{"date":"2009-10-19T02:19:08","version":"0.9003"},{"date":"2009-10-21T05:59:54","version":"0.9004"},{"date":"2009-10-22T03:55:53","version":"0.9005"},{"date":"2009-10-23T08:22:57","version":"0.9006"},{"date":"2009-10-25T00:49:12","version":"0.9007"},{"date":"2009-10-27T21:20:52","version":"0.9008"},{"date":"2009-11-08T04:51:25","version":"0.9009"},{"version":"0.9010","date":"2009-11-12T07:23:02"},{"version":"0.9011","date":"2009-11-12T11:57:16"},{"date":"2009-11-17T21:48:12","version":"0.9012"},{"date":"2009-11-19T02:29:16","version":"0.9013"},{"version":"0.9014","date":"2009-11-21T05:54:55"},{"version":"0.9015","date":"2009-11-26T08:39:53"},{"date":"2009-11-29T07:41:55","version":"0.9016"},{"version":"0.9017","date":"2009-11-29T08:40:10"},{"version":"0.9018","date":"2009-12-03T08:52:20"},{"date":"2009-12-06T06:01:48","version":"0.9019"},{"version":"0.9020","date":"2009-12-07T10:39:46"},{"version":"0.9021","date":"2009-12-08T22:32:02"},{"date":"2009-12-13T19:03:10","version":"0.9022"},{"date":"2009-12-17T21:22:18","version":"0.9023"},{"date":"2009-12-19T20:28:45","version":"0.9024"},{"date":"2009-12-26T01:16:08","version":"0.9025"},{"version":"0.9026","date":"2010-01-01T01:38:39"},{"date":"2010-01-04T00:36:24","version":"0.9027"},{"date":"2010-01-06T02:44:35","version":"0.9028"},{"version":"0.9029","date":"2010-01-08T03:13:27"},{"version":"0.9030","date":"2010-01-09T21:17:38"},{"version":"0.9031","date":"2010-01-11T19:34:54"},{"date":"2010-01-29T22:44:12","version":"0.99_01"},{"date":"2010-01-31T06:15:25","version":"0.99_02"},{"date":"2010-02-04T00:15:09","version":"0.99_03"},{"version":"0.99_04","date":"2010-02-06T07:17:08"},{"date":"2010-02-10T20:55:18","version":"0.99_05"},{"version":"0.9910","date":"2010-02-23T03:10:40"},{"version":"0.9911","date":"2010-02-23T09:58:27"},{"version":"0.9912","date":"2010-02-25T09:32:19"},{"date":"2010-02-26T03:16:42","version":"0.9913"},{"version":"0.9914","date":"2010-03-04T00:07:15"},{"version":"0.9915","date":"2010-03-08T09:35:55"},{"date":"2010-03-12T03:56:59","version":"0.9916"},{"date":"2010-03-17T22:41:16","version":"0.9917"},{"date":"2010-03-18T05:42:29","version":"0.9918"},{"version":"0.9919","date":"2010-03-18T05:56:03"},{"version":"0.9920","date":"2010-03-19T07:05:16"},{"date":"2010-03-25T22:10:09","version":"0.99_21"},{"version":"0.99_22","date":"2010-03-26T02:51:33"},{"version":"0.99_23","date":"2010-03-27T08:06:00"},{"date":"2010-03-27T20:36:26","version":"0.99_24"},{"version":"0.9925","date":"2010-03-28T02:06:23"},{"date":"2010-03-28T21:49:52","version":"0.9926"},{"date":"2010-03-29T19:51:35","version":"0.9927"},{"version":"0.9928","date":"2010-03-30T00:07:33"},{"date":"2010-03-31T07:37:38","version":"0.9929"},{"date":"2010-04-14T03:22:29","version":"0.9930"},{"date":"2010-04-17T06:54:58","version":"0.9931"},{"version":"0.9932","date":"2010-04-19T06:29:10"},{"date":"2010-04-27T21:35:45","version":"0.9933"},{"date":"2010-05-04T22:51:24","version":"0.9934"},{"date":"2010-05-05T22:21:08","version":"0.9935"},{"version":"0.9936","date":"2010-05-14T23:01:23"},{"date":"2010-05-15T06:14:20","version":"0.9937"},{"version":"0.9938","date":"2010-05-24T00:16:59"},{"version":"0.9938","date":"2010-07-03T01:04:03"},{"version":"0.9940","date":"2010-07-03T06:43:20"},{"version":"0.9941","date":"2010-07-09T01:22:49"},{"date":"2010-07-24T06:46:17","version":"0.9942"},{"version":"0.9943","date":"2010-07-30T20:26:59"},{"date":"2010-08-09T06:40:55","version":"0.9944"},{"version":"0.9945","date":"2010-08-19T23:32:19"},{"date":"2010-08-29T05:49:19","version":"0.9946"},{"version":"0.9947","date":"2010-09-09T09:27:05"},{"version":"0.9948","date":"2010-09-09T23:04:59"},{"date":"2010-09-14T19:01:11","version":"0.9949"},{"version":"0.9950","date":"2010-09-30T21:14:53"},{"version":"0.9951","date":"2010-10-25T21:19:36"},{"date":"2010-12-02T22:06:47","version":"0.9952"},{"version":"0.9953","date":"2010-12-03T22:52:23"},{"version":"0.9954","date":"2010-12-10T01:48:11"},{"date":"2010-12-10T02:03:59","version":"0.9955"},{"version":"0.9956","date":"2010-12-10T03:39:26"},{"version":"0.9957","date":"2010-12-16T19:33:28"},{"version":"0.9958","date":"2010-12-20T23:23:17"},{"version":"0.9959","date":"2010-12-21T19:58:23"},{"version":"0.9960","date":"2010-12-25T19:18:11"},{"version":"0.9961","date":"2011-01-08T05:54:56"},{"date":"2011-01-09T05:21:23","version":"0.9962"},{"date":"2011-01-11T00:51:33","version":"0.9963"},{"version":"0.9964","date":"2011-01-25T00:50:49"},{"version":"0.9965","date":"2011-01-25T07:13:52"},{"date":"2011-01-25T20:03:38","version":"0.9966"},{"version":"0.9967","date":"2011-01-25T22:27:44"},{"date":"2011-02-10T03:09:10","version":"0.9968"},{"version":"0.9969","date":"2011-02-19T05:56:47"},{"date":"2011-02-22T16:44:11","version":"0.9970"},{"date":"2011-02-23T22:07:39","version":"0.9971"},{"version":"0.9972","date":"2011-02-24T19:57:46"},{"version":"0.9973","date":"2011-02-26T17:48:50"},{"version":"0.9974","date":"2011-03-04T04:56:59"},{"date":"2011-03-24T18:38:08","version":"0.99_75"},{"version":"0.9976","date":"2011-04-09T01:29:10"},{"date":"2011-05-01T19:24:37","version":"0.9977"},{"version":"0.9978","date":"2011-05-04T18:31:01"},{"version":"0.9979","date":"2011-05-17T16:59:59"},{"date":"2011-06-07T03:29:28","version":"0.9980"},{"version":"0.9981","date":"2011-07-19T00:35:19"},{"date":"2011-07-19T20:14:06","version":"0.9982"},{"version":"0.9983","date":"2011-09-27T17:23:29"},{"date":"2011-10-03T16:57:23","version":"0.9984"},{"date":"2011-10-31T20:17:46","version":"0.9985"},{"version":"0.9986","date":"2012-03-12T18:29:44"},{"version":"0.9987","date":"2012-05-10T05:13:38"},{"date":"2012-05-11T10:27:33","version":"0.9988"},{"date":"2012-06-21T20:49:15","version":"0.9989"},{"date":"2012-07-18T18:17:16","version":"0.9990"},{"date":"2012-07-20T00:30:44","version":"0.9991"},{"date":"2012-07-20T02:12:14","version":"1.0000"},{"version":"1.0001","date":"2012-07-26T23:28:35"},{"date":"2012-08-14T00:09:45","version":"1.0002"},{"version":"1.0003","date":"2012-08-29T20:49:18"},{"version":"1.0004","date":"2012-09-20T02:21:25"},{"version":"1.0005","date":"2012-10-09T20:37:58"},{"date":"2012-10-18T23:10:01","version":"1.0006"},{"version":"1.0007","date":"2012-10-21T06:23:22"},{"date":"2012-10-23T01:54:12","version":"1.0008"},{"date":"2012-10-23T07:59:59","version":"1.0009"},{"date":"2012-11-02T20:33:36","version":"1.0010"},{"version":"1.0011","date":"2012-11-11T19:09:23"},{"date":"2012-11-14T20:02:29","version":"1.0012"},{"version":"1.0013","date":"2012-11-15T03:49:43"},{"date":"2012-12-03T18:30:20","version":"1.0014"},{"version":"1.0015","date":"2013-01-10T23:23:32"},{"version":"1.0016","date":"2013-01-31T21:28:36"},{"date":"2013-02-08T03:43:51","version":"1.0017"},{"version":"1.0018","date":"2013-03-08T18:47:51"},{"date":"2013-04-02T01:39:27","version":"1.0019"},{"date":"2013-04-02T02:39:03","version":"1.0020"},{"date":"2013-04-02T18:21:32","version":"1.0021"},{"version":"1.0022","date":"2013-04-02T19:38:30"},{"version":"1.0023","date":"2013-04-08T18:14:06"},{"version":"1.0024","date":"2013-05-01T17:07:27"},{"version":"1.0025","date":"2013-06-12T20:10:31"},{"date":"2013-06-13T06:01:17","version":"1.0026"},{"date":"2013-06-14T04:31:09","version":"1.0027"},{"date":"2013-06-15T08:44:43","version":"1.0028"},{"date":"2013-08-22T21:06:25","version":"1.0029"},{"date":"2013-11-23T07:55:52","version":"1.0030"},{"date":"2014-08-01T20:20:15","version":"1.0031"},{"date":"2014-10-04T18:14:01","version":"1.0032"},{"date":"2014-10-23T20:32:28","version":"1.0033"},{"version":"1.0034","date":"2015-02-02T20:44:19"},{"version":"1.0035","date":"2015-04-16T08:09:20"},{"date":"2015-06-03T19:03:39","version":"1.0036"},{"version":"1.0037","date":"2015-06-19T17:02:08"},{"version":"1.0038","date":"2015-11-25T20:37:51"},{"date":"2015-12-06T11:29:40","version":"1.0039"},{"date":"2016-04-01T16:58:21","version":"1.0040"},{"version":"1.0041","date":"2016-09-25T21:25:47"},{"date":"2016-09-29T05:38:42","version":"1.0042"},{"date":"2017-02-22T03:02:05","version":"1.0043"},{"date":"2017-04-27T17:48:20","version":"1.0044"},{"version":"1.0045","date":"2017-12-31T20:42:50"},{"date":"2018-02-10T07:52:31","version":"1.0046"},{"date":"2018-02-10T09:25:30","version":"1.0047"},{"date":"2020-11-30T00:21:36","version":"1.0048"},{"version":"1.0049","date":"2022-09-01T17:44:48"},{"version":"1.0050","date":"2022-09-05T15:48:11"},{"date":"2024-01-05T23:11:02","version":"1.0051"},{"date":"2024-09-30T20:39:33","version":"1.0052"},{"date":"2024-12-12T21:11:55","version":"1.0053"}],"main_module":"Plack"},"XML-Simple":{"versions":[{"date":"1999-11-29T02:30:19","version":"1.00"},{"date":"1999-12-01T11:02:42","version":"1.01"},{"version":"1.03","date":"2000-03-05T20:58:37"},{"version":"1.04","date":"2000-04-03T04:12:07"},{"date":"2000-08-30T23:40:57","version":"1.05"},{"date":"2001-11-19T22:04:26","version":"1.06"},{"version":"1.07","date":"2002-02-05T22:46:39"},{"date":"2002-02-09T22:43:03","version":"1.08"},{"version":"1.08_01","date":"2002-02-14T22:13:24"},{"date":"2002-12-08T08:23:26","version":"2.00"},{"date":"2002-12-11T09:56:59","version":"2.01"},{"version":"2.02","date":"2002-12-15T08:21:09"},{"date":"2003-01-20T07:54:05","version":"2.03"},{"version":"2.04","date":"2003-04-10T10:25:56"},{"date":"2003-04-16T10:22:00","version":"2.05"},{"version":"2.06","date":"2003-05-18T08:50:04"},{"date":"2003-05-20T08:53:19","version":"2.07"},{"version":"2.08","date":"2003-06-13T10:31:53"},{"version":"2.09","date":"2003-09-09T09:43:24"},{"date":"2004-02-29T10:18:06","version":"2.10"},{"version":"2.11","date":"2004-03-02T08:29:33"},{"version":"2.12","date":"2004-04-05T09:29:23"},{"date":"2004-11-17T09:06:18","version":"2.13"},{"date":"2005-01-29T05:16:40","version":"2.14"},{"version":"2.15","date":"2006-10-03T01:33:47"},{"version":"2.16","date":"2006-10-30T08:33:07"},{"version":"2.17","date":"2007-08-02T10:47:38"},{"date":"2007-08-15T10:39:25","version":"2.18"},{"date":"2012-06-17T11:28:59","version":"2.19_01"},{"date":"2012-06-19T08:34:33","version":"2.19_02"},{"version":"2.20","date":"2012-06-20T10:01:37"},{"version":"2.21","date":"2015-12-04T03:35:12"},{"date":"2015-12-04T22:08:47","version":"2.22"},{"version":"2.23","date":"2017-04-17T03:49:52"},{"date":"2017-04-17T04:12:48","version":"2.24"},{"date":"2018-03-18T03:19:24","version":"2.25"}],"main_module":"XML::Simple","advisories":[{"id":"CPANSA-XML-Simple-2018-01","distribution":"XML-Simple","description":"The No. 4 item on the OWASP top 10 is external XML entities. When using XML::Parser, XML::Simple is currently vulnerable by default.\n","cves":[],"reported":"2018-02-18","fixed_versions":[">=2.25"],"severity":null,"affected_versions":["<2.25"],"references":["https://metacpan.org/dist/XML-Simple/changes","https://github.com/grantm/xml-simple/pull/8"]}]},"MySQL-Admin":{"versions":[{"version":"0.41","date":"2009-04-05T07:27:17"},{"date":"2009-04-25T12:13:07","version":"0.42"},{"date":"2009-05-02T16:39:11","version":"0.43"},{"date":"2009-05-06T16:32:16","version":"0.44"},{"version":"0.47","date":"2009-09-20T10:34:08"},{"date":"2009-09-20T17:52:11","version":"0.48"},{"date":"2009-09-20T19:27:03","version":"0.5"},{"date":"2009-09-23T13:03:36","version":"0.51"},{"version":"0.52","date":"2009-09-26T10:35:54"},{"version":"0.54","date":"2009-09-28T06:12:57"},{"version":"0.55","date":"2009-09-29T10:34:19"},{"version":"0.56","date":"2009-09-30T16:13:36"},{"date":"2009-10-03T07:37:25","version":"0.57"},{"version":"0.58","date":"2009-10-04T06:02:37"},{"version":"0.59","date":"2009-10-04T09:07:10"},{"version":"0.6","date":"2009-10-05T15:31:56"},{"date":"2009-10-13T13:03:13","version":"0.61"},{"version":"0.62","date":"2009-10-13T13:28:16"},{"date":"2015-03-22T15:18:03","version":"0.65"},{"version":"0.66","date":"2015-03-24T07:27:33"},{"date":"2015-03-26T19:31:05","version":"0.67"},{"version":"0.68","date":"2015-03-30T18:13:38"},{"date":"2015-04-01T20:54:59","version":"0.69"},{"version":"0.7","date":"2015-04-02T18:13:25"},{"date":"2015-04-02T20:01:04","version":"0.71"},{"version":"0.72","date":"2015-04-06T19:38:13"},{"date":"2015-04-07T17:24:44","version":"0.73"},{"date":"2015-04-09T20:30:39","version":"0.74"},{"date":"2015-04-12T19:12:02","version":"0.75"},{"version":"0.76","date":"2015-04-18T10:10:22"},{"date":"2015-04-23T19:09:21","version":"0.77"},{"version":"0.79","date":"2015-06-19T21:18:27"},{"version":"0.8","date":"2015-06-20T15:56:45"},{"version":"0.81","date":"2015-06-21T11:51:26"},{"version":"0.84","date":"2015-07-09T20:24:39"},{"version":"0.85","date":"2015-07-10T12:25:42"},{"date":"2015-07-11T17:51:30","version":"0.86"},{"version":"0.87","date":"2015-07-26T19:47:51"},{"date":"2015-10-10T14:46:47","version":"0.89"},{"date":"2015-10-31T17:56:24","version":"0.9"},{"date":"2015-11-01T11:42:27","version":"0.91"},{"version":"0.92","date":"2015-11-01T13:05:50"},{"date":"2015-12-27T20:50:17","version":"0.93"},{"version":"0.94","date":"2016-01-25T20:30:24"},{"date":"2016-01-26T09:59:39","version":"0.95"},{"date":"2016-01-26T13:59:30","version":"0.96"},{"date":"2016-01-28T09:10:44","version":"0.97"},{"version":"0.98","date":"2016-02-03T21:51:55"},{"version":"0.99","date":"2016-02-06T07:24:22"},{"date":"2016-02-06T10:01:55","version":"1"},{"date":"2016-02-06T17:43:58","version":"1.01"},{"version":"1.02","date":"2016-02-14T18:20:01"},{"version":"1.03","date":"2016-02-23T12:55:34"},{"date":"2016-02-24T14:56:54","version":"1.04"},{"version":"1.05","date":"2016-05-15T18:28:42"},{"date":"2016-06-25T20:34:51","version":"1.06"},{"version":"1.07","date":"2016-06-26T11:54:44"},{"date":"2016-10-26T20:01:37","version":"1.08"},{"date":"2016-10-26T20:17:36","version":"1.09"},{"version":"1.1","date":"2017-01-25T20:32:12"},{"date":"2017-01-26T20:40:27","version":"1.11"},{"date":"2017-01-29T19:25:00","version":"1.12"},{"version":"1.13","date":"2018-06-03T15:06:18"},{"version":"1.14","date":"2018-06-10T16:38:09"},{"version":"1.15","date":"2018-07-01T19:20:11"},{"date":"2018-07-24T05:59:11","version":"1.16"},{"date":"2019-04-22T13:37:27","version":"1.17"},{"version":"1.18","date":"2019-05-26T14:49:11"}],"main_module":"MySQL::Admin","advisories":[{"reported":null,"cves":[],"fixed_versions":[">=0.34"],"description":"Unspecified security issues.\n","distribution":"MySQL-Admin","id":"CPANSA-MySQL-Admin-1-1","references":["https://metacpan.org/dist/MySQL-Admin/changes"],"affected_versions":["<0.34"],"severity":null}]},"File-Temp":{"advisories":[{"severity":"high","references":["http://www.openwall.com/lists/oss-security/2011/11/04/2","https://rt.cpan.org/Public/Bug/Display.html?id=69106","https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14","http://www.openwall.com/lists/oss-security/2011/11/04/4","https://seclists.org/oss-sec/2011/q4/238"],"affected_versions":[">0"],"id":"CPANSA-File-Temp-2011-4116","cves":["CVE-2011-4116"],"reported":"2020-01-31","fixed_versions":[],"description":"_is_safe in the File::Temp module for Perl does not properly handle symlinks.\n","distribution":"File-Temp"}],"versions":[{"date":"2000-03-14T20:15:55","version":"0.05"},{"date":"2000-04-28T04:48:55","version":"0.07"},{"version":"0.08","date":"2000-05-16T01:10:28"},{"date":"2000-07-26T20:30:30","version":"0.09"},{"version":"0.11","date":"2000-12-12T21:04:53"},{"version":"0.12","date":"2001-02-23T00:37:44"},{"version":"0.13","date":"2003-08-16T04:06:11"},{"date":"2003-08-17T04:42:50","version":"0.14"},{"version":"0.15","date":"2005-02-22T05:40:33"},{"date":"2005-02-22T21:42:47","version":"0.16"},{"date":"2006-08-18T22:40:10","version":"0.17"},{"version":"0.18","date":"2007-01-22T00:18:40"},{"version":"0.19","date":"2007-11-20T08:28:08"},{"date":"2007-12-21T00:46:29","version":"0.20"},{"date":"2008-11-14T01:30:09","version":"0.21"},{"version":"0.22","date":"2009-06-29T07:41:24"},{"version":"0.22_90","date":"2013-02-07T17:03:45"},{"version":"0.23","date":"2013-03-14T21:57:42"},{"version":"0.2301","date":"2013-04-11T15:31:13"},{"date":"2013-09-26T13:48:13","version":"0.2302"},{"version":"0.2303","date":"2013-10-09T13:59:01"},{"date":"2013-10-10T13:17:32","version":"0.2304"},{"version":"0.2305","date":"2018-04-19T12:01:34"},{"date":"2018-06-24T19:34:31","version":"0.2306"},{"version":"0.2307","date":"2018-06-24T19:41:28"},{"date":"2018-07-11T21:07:49","version":"0.2308"},{"date":"2019-01-06T20:32:53","version":"0.2309"},{"version":"0.2310","date":"2020-09-26T17:39:38"},{"version":"0.2311","date":"2020-10-03T04:04:55"},{"perl_release":"5.009003","version":"0.16_01","dual_lived":1,"date":"2006-01-28T00:00:00"}],"main_module":"File::Temp"},"XML-Atom":{"advisories":[{"reported":"2021-07-09","cves":["CVE-2012-1102"],"fixed_versions":[],"distribution":"XML-Atom","description":"It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used.\n","id":"CPANSA-XML-Atom-2012-1102","affected_versions":["<0.39"],"references":["https://seclists.org/oss-sec/2012/q1/549","https://metacpan.org/release/MIYAGAWA/XML-Atom-0.39/source/Changes"],"severity":"high"}],"main_module":"XML::Atom","versions":[{"date":"2003-09-08T04:47:09","version":"0.01"},{"date":"2003-09-28T23:11:32","version":"0.02"},{"version":"0.03","date":"2003-12-05T09:20:27"},{"date":"2003-12-15T08:03:04","version":"0.04"},{"version":"0.041","date":"2003-12-15T17:10:29"},{"version":"0.05","date":"2004-01-06T05:04:22"},{"version":"0.06","date":"2004-04-24T23:47:03"},{"date":"2004-05-16T01:13:46","version":"0.07"},{"date":"2004-06-02T06:05:57","version":"0.08"},{"date":"2004-07-30T05:49:54","version":"0.09"},{"date":"2005-01-01T00:20:55","version":"0.10"},{"version":"0.11","date":"2005-02-24T03:19:08"},{"version":"0.12","date":"2005-06-07T05:13:21"},{"version":"0.12_01","date":"2005-07-19T21:00:39"},{"version":"0.12_02","date":"2005-08-16T21:46:06"},{"date":"2005-08-18T07:18:26","version":"0.13"},{"date":"2005-09-14T05:38:53","version":"0.13_01"},{"date":"2005-10-21T04:55:40","version":"0.14"},{"version":"0.15","date":"2005-11-01T05:55:40"},{"version":"0.16","date":"2005-11-22T21:17:26"},{"version":"0.17","date":"2006-02-22T23:24:00"},{"date":"2006-03-16T06:14:49","version":"0.18"},{"date":"2006-03-19T05:03:12","version":"0.19"},{"version":"0.19_01","date":"2006-04-30T16:49:38"},{"date":"2006-07-07T06:39:52","version":"0.19_03"},{"version":"0.20","date":"2006-07-12T03:44:58"},{"version":"0.21","date":"2006-07-12T17:44:49"},{"version":"0.21_01","date":"2006-07-19T10:42:43"},{"version":"0.21_02","date":"2006-07-20T08:07:49"},{"version":"0.21_03","date":"2006-07-21T10:15:06"},{"version":"0.22","date":"2006-07-24T20:00:37"},{"version":"0.22_01","date":"2006-08-27T05:53:47"},{"version":"0.23","date":"2006-08-27T06:42:17"},{"version":"0.24","date":"2006-11-25T23:03:57"},{"date":"2006-11-30T23:14:23","version":"0.25"},{"version":"0.25_01","date":"2007-04-27T20:57:39"},{"date":"2007-06-20T19:23:36","version":"0.25_02"},{"version":"0.26","date":"2007-09-16T04:24:44"},{"version":"0.27","date":"2007-09-16T04:41:58"},{"version":"0.27_01","date":"2007-10-04T20:30:48"},{"date":"2007-11-06T21:08:06","version":"0.28"},{"version":"0.29","date":"2008-10-26T00:27:44"},{"version":"0.30","date":"2008-11-12T22:45:37"},{"date":"2008-11-13T21:19:34","version":"0.31"},{"version":"0.32","date":"2008-11-23T22:07:41"},{"date":"2009-01-07T02:00:59","version":"0.33"},{"version":"0.34","date":"2009-04-29T17:46:03"},{"version":"0.35","date":"2009-05-01T23:42:30"},{"date":"2009-12-21T22:02:23","version":"0.36"},{"date":"2009-12-29T02:32:53","version":"0.37"},{"date":"2011-05-23T02:57:51","version":"0.38"},{"version":"0.39","date":"2011-06-21T04:07:51"},{"version":"0.40","date":"2011-09-18T19:43:27"},{"version":"0.41","date":"2011-09-27T01:44:56"},{"version":"0.42","date":"2017-05-12T05:34:02"},{"date":"2021-04-28T20:40:29","version":"0.43"}]},"Module-Provision":{"versions":[{"version":"v0.3.43","date":"2013-04-14T19:20:34"},{"version":"v0.3.44","date":"2013-04-15T12:46:30"},{"date":"2013-04-15T17:33:39","version":"v0.3.45"},{"version":"v0.4.47","date":"2013-04-21T16:14:43"},{"version":"v0.4.51","date":"2013-04-22T15:09:36"},{"version":"v0.6.59","date":"2013-04-24T04:13:42"},{"version":"v0.7.4","date":"2013-04-24T23:34:41"},{"date":"2013-04-27T01:18:07","version":"v0.7.6"},{"date":"2013-04-27T11:36:59","version":"v0.7.7"},{"date":"2013-04-30T22:32:47","version":"v0.8.3"},{"version":"v0.9.5","date":"2013-05-02T18:45:43"},{"date":"2013-05-04T00:14:46","version":"v0.10.1"},{"version":"v0.11.1","date":"2013-05-04T20:22:41"},{"version":"v0.12.1","date":"2013-05-06T15:08:18"},{"date":"2013-05-08T15:51:41","version":"v0.12.3"},{"date":"2013-05-09T23:42:20","version":"v0.12.5"},{"date":"2013-05-10T19:29:24","version":"v0.12.6"},{"date":"2013-05-11T02:15:00","version":"v0.13.1"},{"date":"2013-05-11T13:59:50","version":"v0.14.2"},{"date":"2013-05-12T18:03:55","version":"v0.15.3"},{"version":"v0.15.5","date":"2013-05-14T12:49:37"},{"date":"2013-05-15T17:55:40","version":"v0.15.6"},{"date":"2013-05-15T20:59:19","version":"v0.15.7"},{"version":"v0.15.8","date":"2013-05-16T23:02:48"},{"date":"2013-05-19T12:59:15","version":"v0.15.9"},{"version":"v0.16.1","date":"2013-06-08T17:12:50"},{"date":"2013-07-28T18:42:27","version":"v0.17.16"},{"date":"2013-07-29T16:10:28","version":"v0.17.17"},{"version":"v0.17.18","date":"2013-07-29T23:51:34"},{"version":"v0.17.19","date":"2013-07-30T13:06:37"},{"version":"v0.18.0","date":"2013-08-07T17:56:55"},{"date":"2013-08-07T17:58:22","version":"v0.18.1"},{"date":"2013-08-08T13:39:44","version":"v0.18.2"},{"version":"v0.18.3","date":"2013-08-10T08:51:08"},{"date":"2013-08-10T21:18:54","version":"v0.18.4"},{"date":"2013-08-17T15:47:30","version":"0.20.1"},{"version":"0.21.1","date":"2013-08-21T12:36:06"},{"version":"0.22.1","date":"2013-08-21T12:56:35"},{"date":"2013-09-14T09:38:12","version":"0.23.1"},{"version":"0.24.1","date":"2013-09-16T20:23:50"},{"version":"0.25.1","date":"2013-11-23T13:38:55"},{"date":"2013-11-25T21:30:21","version":"0.26.1"},{"date":"2013-12-11T17:25:32","version":"0.27.1"},{"date":"2013-12-12T14:23:50","version":"0.28.1"},{"version":"0.29.1","date":"2013-12-12T21:54:50"},{"version":"0.31.2","date":"2014-01-24T21:05:50"},{"version":"0.32.1","date":"2014-05-01T14:42:10"},{"version":"0.33.1","date":"2014-05-15T20:55:59"},{"date":"2014-05-19T11:47:05","version":"0.34.1"},{"date":"2014-10-28T13:51:21","version":"0.36.1"},{"date":"2015-02-11T17:52:30","version":"0.38.1"},{"version":"0.39.1","date":"2015-02-11T19:03:04"},{"date":"2015-06-08T21:47:29","version":"0.40.1"},{"version":"0.41.1","date":"2016-04-04T12:15:12"},{"date":"2017-05-08T19:30:17","version":"0.42.1"}],"main_module":"Module::Provision","advisories":[{"reported":"2016-08-02","cves":["CVE-2016-1238"],"fixed_versions":[">=0.42.1"],"distribution":"Module-Provision","description":"(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","id":"CPANSA-Module-Provision-2016-1238","references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"affected_versions":["<0.42.1"],"severity":"high"}]},"Proc-ProcessTable":{"advisories":[{"affected_versions":[">=0.45,<0.47"],"references":["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650500","http://www.osvdb.org/77428","http://www.openwall.com/lists/oss-security/2011/11/30/2","http://www.securityfocus.com/bid/50868","https://rt.cpan.org/Public/Bug/Display.html?id=72862","http://www.openwall.com/lists/oss-security/2011/11/30/3","http://secunia.com/advisories/47015","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4363"],"severity":null,"description":"ProcessTable.pm in the Proc::ProcessTable module 0.45 for Perl, when TTY information caching is enabled, allows local users to overwrite arbitrary files via a symlink attack on /tmp/TTYDEVS.\n","distribution":"Proc-ProcessTable","fixed_versions":[">=0.47"],"reported":"2012-10-07","cves":["CVE-2011-4363"],"id":"CPANSA-Proc-ProcessTable-2011-4363"}],"versions":[{"version":"0.01","date":"1998-07-23T12:59:39"},{"version":"0.02","date":"1998-07-24T12:50:40"},{"version":"0.03","date":"1998-07-26T13:18:26"},{"version":"0.04","date":"1998-08-15T21:22:20"},{"version":"0.05","date":"1998-12-09T23:53:30"},{"date":"1998-12-10T04:51:19","version":"0.06"},{"date":"1999-02-05T03:21:51","version":"0.08"},{"date":"1999-02-20T04:27:53","version":"0.09"},{"date":"1999-02-20T16:36:14","version":"0.10"},{"date":"1999-03-07T00:16:52","version":"0.11"},{"version":"0.12","date":"1999-03-21T16:07:46"},{"version":"0.13","date":"1999-05-14T02:10:41"},{"date":"1999-05-16T01:22:45","version":"0.14"},{"version":"0.15","date":"1999-06-02T02:39:22"},{"date":"1999-08-10T03:45:58","version":"0.16"},{"date":"1999-08-19T15:45:19","version":"0.17"},{"date":"1999-08-19T17:44:22","version":"0.18"},{"date":"1999-09-09T02:45:48","version":"0.20"},{"version":"0.21","date":"1999-09-10T16:51:02"},{"date":"1999-10-05T12:34:33","version":"0.22"},{"date":"1999-11-01T13:55:15","version":"0.23"},{"version":"0.24","date":"2000-01-20T20:57:35"},{"version":"0.25","date":"2000-02-03T16:28:46"},{"date":"2000-02-11T21:56:23","version":"0.26"},{"version":"0.27","date":"2000-06-29T12:38:46"},{"date":"2000-08-14T09:25:19","version":"0.28"},{"date":"2001-01-09T12:47:49","version":"0.29"},{"version":"0.30","date":"2001-03-08T02:57:16"},{"version":"0.31","date":"2001-06-01T12:39:15"},{"version":"0.32","date":"2001-08-20T02:41:52"},{"date":"2001-10-16T13:32:04","version":"0.33"},{"version":"0.34","date":"2002-02-25T03:17:15"},{"version":"0.35","date":"2002-07-03T04:31:57"},{"date":"2002-11-08T02:31:59","version":"0.36"},{"version":"0.37","date":"2002-11-08T14:59:11"},{"date":"2002-12-07T03:33:51","version":"0.38"},{"version":"0.39","date":"2003-10-03T17:45:51"},{"version":"0.40","date":"2005-07-11T01:33:32"},{"version":"0.41","date":"2006-07-01T04:27:59"},{"version":"0.42","date":"2008-01-26T05:34:53"},{"version":"0.43","date":"2008-07-18T04:05:51"},{"version":"0.44","date":"2008-07-25T14:29:08"},{"date":"2008-09-08T15:39:40","version":"0.45"},{"version":"0.46","date":"2012-10-19T13:58:48"},{"date":"2013-02-16T16:06:35","version":"0.47"},{"date":"2013-05-26T22:20:21","version":"0.48"},{"date":"2013-12-05T23:31:39","version":"0.49"},{"version":"0.50","date":"2013-12-15T15:47:54"},{"date":"2014-05-17T21:03:43","version":"0.50_01"},{"version":"0.51","date":"2014-10-17T22:56:58"},{"date":"2015-08-23T10:12:37","version":"0.52"},{"date":"2015-08-24T19:36:41","version":"0.53"},{"version":"0.54","date":"2018-02-01T21:02:36"},{"version":"0.55","date":"2018-02-01T21:57:51"},{"version":"0.56","date":"2019-02-07T22:38:02"},{"date":"2019-06-14T21:16:11","version":"0.56_01"},{"date":"2019-06-15T11:28:52","version":"0.56_02"},{"version":"0.57","date":"2019-06-15T18:56:51"},{"date":"2019-06-15T19:20:02","version":"0.58"},{"date":"2019-06-20T19:35:05","version":"0.59"},{"version":"0.60","date":"2021-08-14T16:19:38"},{"version":"0.61","date":"2021-08-17T22:50:12"},{"date":"2021-08-18T06:57:20","version":"0.611"},{"date":"2021-09-08T10:39:21","version":"0.612"},{"version":"0.62","date":"2021-09-13T14:03:14"},{"version":"0.631","date":"2021-09-26T21:58:24"},{"date":"2021-09-26T22:35:32","version":"0.632"},{"version":"0.633","date":"2021-09-26T23:01:20"},{"date":"2021-09-26T23:04:23","version":"0.634"},{"date":"2023-05-08T06:51:59","version":"0.635"},{"version":"0.636","date":"2023-06-21T06:25:43"}],"main_module":"Proc::ProcessTable"},"Catalyst-Plugin-Static-Simple":{"versions":[{"date":"2005-08-12T01:37:04","version":"0.01"},{"version":"0.02","date":"2005-08-16T22:09:54"},{"date":"2005-08-22T03:44:24","version":"0.03"},{"date":"2005-08-22T15:59:08","version":"0.04"},{"version":"0.05","date":"2005-08-26T15:58:06"},{"date":"2005-09-05T19:36:58","version":"0.06"},{"date":"2005-09-06T01:07:28","version":"0.07"},{"date":"2005-09-07T22:52:21","version":"0.08"},{"date":"2005-10-07T17:40:16","version":"0.09"},{"date":"2005-10-19T21:19:04","version":"0.10"},{"version":"0.11","date":"2005-11-14T00:28:01"},{"date":"2005-12-15T14:56:40","version":"0.13"},{"date":"2006-03-24T16:18:59","version":"0.14"},{"date":"2006-07-05T16:35:54","version":"0.14"},{"version":"0.15","date":"2006-12-09T03:25:57"},{"date":"2007-04-30T18:48:25","version":"0.16"},{"date":"2007-05-11T14:52:16","version":"0.17"},{"date":"2007-07-01T04:12:31","version":"0.18"},{"date":"2007-07-02T20:54:05","version":"0.19"},{"date":"2007-09-24T13:50:15","version":"0.20"},{"date":"2009-03-29T18:47:56","version":"0.21"},{"date":"2009-08-21T16:21:17","version":"0.22"},{"version":"0.23","date":"2009-10-06T16:51:19"},{"version":"0.24","date":"2009-10-18T18:12:48"},{"date":"2009-10-22T20:49:26","version":"0.25"},{"date":"2009-12-06T12:32:46","version":"0.26"},{"version":"0.27","date":"2010-01-03T14:56:26"},{"version":"0.28","date":"2010-01-04T13:18:25"},{"version":"0.29","date":"2010-02-01T18:48:45"},{"date":"2012-05-04T17:17:29","version":"0.30"},{"date":"2013-09-09T14:32:43","version":"0.31"},{"date":"2014-06-05T12:44:48","version":"0.32"},{"version":"0.33","date":"2014-10-29T16:02:17"},{"date":"2017-08-02T17:00:14","version":"0.34"},{"date":"2018-03-14T12:13:30","version":"0.35"},{"date":"2018-03-15T11:41:17","version":"0.36"},{"date":"2021-05-05T14:30:07","version":"0.37"}],"main_module":"Catalyst::Plugin::Static::Simple","advisories":[{"affected_versions":["<0.34"],"references":["https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/","https://metacpan.org/pod/CPAN::Checksums"],"id":"CPANSA-Catalyst-Plugin-Static-Simple-2017-01","cves":["CVE-2017-16248"],"reported":"2017-10-31","fixed_versions":[">=0.34"],"description":"The Catalyst-Plugin-Static-Simple module before 0.34 for Perl allows remote attackers to read arbitrary files if there is a '.' character anywhere in the pathname, which differs from the intended policy of allowing access only when the filename itself has a '.' character.\n","distribution":"Catalyst-Plugin-Static-Simple"}]},"CGI-Auth-Basic":{"advisories":[{"affected_versions":["<1.11"],"references":["https://metacpan.org/changes/distribution/CGI-Auth-Basic"],"id":"CPANSA-CGI-Auth-Basic-2007-01","description":"TBD\n","distribution":"CGI-Auth-Basic","reported":"2007-12-30","cves":[],"fixed_versions":[">=1.11"]}],"versions":[{"date":"2004-02-21T14:58:09","version":"1.0"},{"version":"1.01","date":"2004-08-31T13:29:28"},{"date":"2004-11-07T03:34:32","version":"1.02"},{"version":"1.10","date":"2006-06-18T01:12:15"},{"date":"2007-12-30T20:53:33","version":"1.11"},{"version":"1.20","date":"2009-04-18T04:22:51"},{"version":"1.21","date":"2009-04-23T17:00:50"},{"date":"2009-04-24T15:07:48","version":"1.21"},{"version":"1.22","date":"2012-08-27T01:50:53"},{"version":"1.23","date":"2015-01-21T00:26:01"},{"date":"2018-12-23T21:03:03","version":"1.24"}],"main_module":"CGI::Auth::Basic"},"YAML":{"advisories":[{"references":["https://github.com/ingydotnet/yaml-pm/issues/212"],"affected_versions":["<1.28"],"severity":null,"reported":"2019-04-27","cves":[],"fixed_versions":[">=1.28"],"description":"Loading globs is easily exploitable.\n","distribution":"YAML","id":"CPANSA-YAML-2019-01"},{"severity":null,"affected_versions":["<1.25"],"references":["https://github.com/ingydotnet/yaml-pm/issues/176"],"id":"CPANSA-YAML-2017-01","description":"YAML loader can run DESTROY method of object created with perl/* tag.\n","distribution":"YAML","cves":[],"reported":"2017-05-10","fixed_versions":[">=1.25"]}],"main_module":"YAML","versions":[{"version":"0.25","date":"2001-12-19T10:33:57"},{"version":"0.26","date":"2002-01-10T06:33:41"},{"date":"2002-01-15T22:34:34","version":"0.30"},{"date":"2002-06-25T06:25:48","version":"0.35"},{"version":"0.49_01","date":"2004-01-20T09:22:57"},{"date":"2005-01-31T06:49:59","version":"0.36"},{"date":"2005-03-31T02:57:10","version":"0.37"},{"version":"0.38","date":"2005-03-31T10:16:09"},{"date":"2005-04-12T22:41:53","version":"0.39"},{"version":"0.39","date":"2005-04-25T19:42:26"},{"date":"2005-12-25T19:27:42","version":"0.49_70"},{"version":"0.50","date":"2006-01-10T05:55:16"},{"date":"2006-01-14T19:47:39","version":"0.50"},{"date":"2006-01-18T23:03:28","version":"0.52"},{"version":"0.53","date":"2006-01-19T19:13:35"},{"version":"0.54","date":"2006-01-30T02:22:33"},{"version":"0.55","date":"2006-01-30T03:11:55"},{"version":"0.56","date":"2006-01-30T18:41:21"},{"date":"2006-02-02T07:36:12","version":"0.56"},{"version":"0.58","date":"2006-02-14T21:21:22"},{"version":"0.60","date":"2006-07-01T05:16:14"},{"version":"0.61","date":"2006-07-02T20:36:06"},{"date":"2006-07-03T22:52:48","version":"0.62"},{"version":"0.63","date":"2007-06-20T23:18:21"},{"date":"2007-06-21T23:29:30","version":"0.64"},{"date":"2007-06-22T00:58:23","version":"0.65"},{"date":"2007-09-27T09:16:07","version":"0.66"},{"date":"2008-12-01T10:57:39","version":"0.67"},{"date":"2008-12-04T09:07:34","version":"0.68"},{"version":"0.69_01","date":"2009-08-10T05:19:57"},{"date":"2009-08-10T12:44:33","version":"0.69_02"},{"date":"2009-08-10T17:23:08","version":"0.70"},{"version":"0.71","date":"2010-01-03T01:52:05"},{"date":"2010-09-01T02:04:50","version":"0.72"},{"version":"0.73","date":"2011-04-19T10:57:00"},{"date":"2011-09-25T20:06:34","version":"0.74"},{"version":"0.75","date":"2011-09-26T22:47:06"},{"version":"0.76","date":"2011-09-28T10:06:35"},{"date":"2011-09-29T16:29:20","version":"0.77"},{"version":"0.78","date":"2012-01-02T07:55:05"},{"version":"0.79","date":"2012-02-09T01:26:43"},{"version":"0.80","date":"2012-02-10T20:57:18"},{"version":"0.81","date":"2012-04-19T18:04:48"},{"date":"2012-07-12T18:51:27","version":"0.82"},{"version":"0.83","date":"2012-07-13T15:45:29"},{"date":"2012-07-13T18:19:24","version":"0.84"},{"version":"0.85","date":"2013-11-24T15:44:47"},{"date":"2013-11-26T16:43:45","version":"0.86"},{"version":"0.87","date":"2013-12-01T05:53:16"},{"date":"2013-12-03T05:30:33","version":"0.88"},{"version":"0.89","date":"2014-02-08T22:12:24"},{"date":"2014-02-10T16:45:22","version":"0.90"},{"version":"0.91","date":"2014-05-27T21:16:01"},{"date":"2014-05-29T03:07:13","version":"0.92"},{"version":"0.93","date":"2014-06-14T05:33:25"},{"version":"0.94","date":"2014-06-14T17:34:58"},{"version":"0.95","date":"2014-06-20T19:10:04"},{"version":"0.96","date":"2014-07-14T05:59:12"},{"version":"0.97","date":"2014-07-17T06:38:34"},{"version":"0.98","date":"2014-07-30T19:33:24"},{"date":"2014-08-07T00:57:08","version":"0.99"},{"date":"2014-08-07T07:36:47","version":"1.00"},{"version":"1.01","date":"2014-08-07T21:49:48"},{"version":"1.02","date":"2014-08-16T04:11:27"},{"version":"1.03","date":"2014-08-16T10:33:26"},{"date":"2014-08-16T15:30:43","version":"1.04"},{"version":"1.05","date":"2014-08-16T20:04:31"},{"date":"2014-08-16T23:51:52","version":"1.06"},{"date":"2014-08-18T15:40:59","version":"1.07"},{"date":"2014-08-18T17:23:04","version":"1.08"},{"version":"1.09","date":"2014-08-19T23:42:23"},{"version":"1.10","date":"2014-08-29T05:54:45"},{"date":"2014-08-30T03:10:03","version":"1.11"},{"version":"1.12","date":"2014-09-22T15:25:30"},{"date":"2014-10-11T16:07:22","version":"1.13"},{"date":"2015-01-17T23:33:39","version":"1.14"},{"date":"2015-04-18T15:04:42","version":"1.15"},{"version":"1.16","date":"2016-07-03T17:53:34"},{"version":"1.16_001","date":"2016-07-05T20:04:45"},{"version":"1.16_002","date":"2016-07-05T20:10:01"},{"date":"2016-07-05T20:21:25","version":"1.17"},{"date":"2016-07-08T14:53:24","version":"1.18"},{"date":"2016-11-11T22:44:07","version":"1.18_001"},{"version":"1.19","date":"2016-11-18T18:46:59"},{"version":"1.19_001","date":"2016-11-27T20:27:37"},{"version":"1.20","date":"2016-12-02T21:21:40"},{"version":"1.20_001","date":"2016-12-02T22:00:08"},{"version":"1.20_002","date":"2016-12-07T21:17:58"},{"date":"2016-12-23T20:20:06","version":"1.21"},{"date":"2017-02-14T22:24:38","version":"1.22"},{"date":"2017-02-19T21:08:48","version":"1.23"},{"date":"2017-05-12T15:06:03","version":"1.23_001"},{"version":"1.23_002","date":"2017-05-14T13:15:34"},{"version":"1.23_003","date":"2017-10-29T22:09:18"},{"version":"1.24","date":"2017-10-30T19:33:07"},{"version":"1.24_001","date":"2018-05-06T19:10:48"},{"version":"1.24_002","date":"2018-05-10T16:22:16"},{"version":"1.25","date":"2018-05-11T17:59:33"},{"version":"1.25_001","date":"2018-05-12T11:43:38"},{"date":"2018-05-17T13:00:07","version":"1.25_002"},{"date":"2018-05-18T19:58:16","version":"1.26"},{"version":"1.26_001","date":"2018-10-18T19:46:23"},{"version":"1.27","date":"2018-11-03T13:02:53"},{"version":"1.27_001","date":"2019-04-27T13:41:56"},{"version":"1.28","date":"2019-04-28T09:46:43"},{"version":"1.28_001","date":"2019-05-05T11:31:39"},{"version":"1.29","date":"2019-05-11T08:28:01"},{"date":"2020-01-27T22:10:33","version":"1.30"},{"date":"2023-12-27T15:11:23","version":"1.31"}]},"Data-Validate-IP":{"versions":[{"version":"0.02","date":"2005-03-04T16:46:50"},{"date":"2005-03-04T20:06:14","version":"0.03"},{"version":"0.04","date":"2005-04-28T15:11:20"},{"date":"2007-03-06T19:45:16","version":"0.05"},{"version":"0.06","date":"2007-05-16T16:08:59"},{"date":"2007-05-18T02:42:07","version":"0.07"},{"version":"0.08","date":"2007-12-06T18:48:53"},{"version":"0.10","date":"2009-06-04T17:52:28"},{"date":"2010-03-01T19:40:48","version":"0.11"},{"version":"0.12","date":"2010-12-29T21:23:08"},{"date":"2011-01-06T14:25:53","version":"0.13"},{"date":"2011-01-06T14:45:14","version":"0.14"},{"version":"0.15","date":"2013-02-05T00:19:11"},{"version":"0.16","date":"2013-02-06T15:18:38"},{"date":"2013-02-19T15:58:21","version":"0.17"},{"date":"2013-02-20T00:31:32","version":"0.18"},{"date":"2013-03-13T15:48:07","version":"0.19"},{"date":"2013-07-13T19:21:15","version":"0.20"},{"date":"2013-12-05T21:16:41","version":"0.21"},{"version":"0.22","date":"2013-12-05T22:47:38"},{"version":"0.23","date":"2014-03-09T16:00:20"},{"date":"2014-08-28T16:00:00","version":"0.24"},{"version":"0.25","date":"2016-02-02T16:17:46"},{"date":"2016-05-31T17:31:50","version":"0.26"},{"date":"2016-11-17T18:05:57","version":0.27},{"version":"0.28","date":"2021-03-29T17:01:17"},{"date":"2021-03-29T17:07:58","version":"0.29"},{"date":"2021-03-29T21:50:39","version":"0.30"},{"version":"0.31","date":"2022-11-28T18:19:55"}],"main_module":"Data::Validate::IP","advisories":[{"affected_versions":["<=0.29"],"references":["https://security.netapp.com/advisory/ntap-20210604-0002/","https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/","https://github.com/houseabsolute/Data-Validate-IP","https://github.com/houseabsolute/Data-Validate-IP/commit/3bba13c819d616514a75e089badd75002fd4f14e","https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-018.md","https://sick.codes/sick-2021-018/"],"reported":"2021-03-31","fixed_versions":[">0.29"],"cves":["CVE-2021-29662"],"description":"The Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.\n","distribution":"Data-Validate-IP","id":"CPANSA-Data-Validate-IP-2021-01"}]},"Web-API":{"advisories":[{"affected_versions":["<=2.8"],"references":["https://metacpan.org/dist/Web-API/source/lib/Web/API.pm#L20","https://metacpan.org/dist/Web-API/source/lib/Web/API.pm#L348","https://metacpan.org/release/BAREFOOT/Data-Random-0.13/source/lib/Data/Random.pm#L537","https://perldoc.perl.org/functions/rand","https://security.metacpan.org/docs/guides/random-data-for-security.html"],"severity":null,"reported":"2025-04-05","fixed_versions":[">2.8"],"cves":["CVE-2024-57868"],"description":"Web::API 2.8 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Web::API uses the Data::Random library which specifically states that it is \"Useful mostly for test programs\". Data::Random uses the rand() function.","distribution":"Web-API","id":"CPANSA-Web-API-2024-57868"}],"main_module":"Web::API","versions":[{"date":"2013-01-07T00:40:46","version":"0.4"},{"version":"0.5","date":"2013-01-07T01:20:59"},{"version":"0.6","date":"2013-01-12T20:34:30"},{"version":"0.7","date":"2013-02-28T02:17:58"},{"date":"2013-03-05T20:49:09","version":"0.8"},{"version":"0.9","date":"2013-05-06T06:15:17"},{"date":"2013-09-13T19:52:23","version":"1.0"},{"version":"1.1","date":"2013-09-16T21:17:08"},{"date":"2013-09-24T16:34:33","version":"1.2"},{"date":"2013-09-25T21:59:25","version":"1.3"},{"version":"1.4","date":"2013-10-28T04:52:47"},{"version":"1.5","date":"2013-10-30T11:32:40"},{"version":"1.6","date":"2013-12-18T00:33:16"},{"date":"2014-03-06T11:15:31","version":"1.7"},{"version":"1.8","date":"2014-03-27T11:28:58"},{"date":"2014-07-02T15:27:23","version":"1.9"},{"version":"2.0","date":"2014-11-26T16:03:35"},{"date":"2014-11-27T02:30:18","version":"2.1"},{"version":"2.2","date":"2014-12-19T01:19:05"},{"date":"2017-05-09T12:30:47","version":"2.2.1"},{"date":"2017-05-10T13:33:17","version":"2.3.0"},{"date":"2017-06-12T15:35:44","version":"2.2.2"},{"date":"2017-10-21T05:34:45","version":"2.2.3"},{"date":"2018-12-25T10:23:53","version":"2.3"},{"date":"2018-12-25T10:58:10","version":"2.3.1"},{"date":"2019-01-07T12:26:54","version":"2.4.0"},{"date":"2019-01-15T04:02:07","version":"2.4.1"},{"version":"2.5","date":"2019-11-18T02:38:25"},{"date":"2019-11-26T05:00:01","version":"2.6"},{"date":"2020-05-02T07:58:13","version":"2.7"},{"date":"2024-04-09T16:02:08","version":"2.8"}]},"Apache-AuthenHook":{"versions":[{"date":"2003-06-20T19:05:21","version":"2.00_01"},{"version":"2.00_03","date":"2004-04-06T01:20:10"},{"date":"2005-04-14T12:57:55","version":"2.00_04"}],"main_module":"Apache::AuthenHook","advisories":[{"id":"CPANSA-Apache-AuthenHook-2010-3845","reported":"2017-08-08","fixed_versions":[],"cves":["CVE-2010-3845"],"distribution":"Apache-AuthenHook","description":"libapache-authenhook-perl 2.00-04 stores usernames and passwords in plaintext in the vhost error log.\n","severity":"critical","affected_versions":[">=2.00_04"],"references":["https://rt.cpan.org/Public/Bug/Display.html?id=62040","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599712","http://seclists.org/oss-sec/2010/q4/63"]}]},"MARC-File-XML":{"advisories":[{"affected_versions":["<1.0.2"],"references":["http://www.securityfocus.com/bid/65057","http://www.nntp.perl.org/group/perl.perl4lib/2014/01/msg3073.html","http://secunia.com/advisories/55404","http://libmail.georgialibraries.org/pipermail/open-ils-general/2014-January/009442.html","https://metacpan.org/source/GMCHARLT/MARC-XML-1.0.2/Changes","http://lists.katipo.co.nz/pipermail/koha/2014-January/038430.html","http://osvdb.org/102367","https://exchange.xforce.ibmcloud.com/vulnerabilities/90620"],"severity":null,"description":"XML External Entity (XXE) vulnerability in MARC::File::XML module before 1.0.2 for Perl, as used in Evergreen, Koha, perl4lib, and possibly other products, allows context-dependent attackers to read arbitrary files via a crafted XML file.\n","distribution":"MARC-File-XML","cves":["CVE-2014-1626"],"reported":"2014-01-26","fixed_versions":[],"id":"CPANSA-MARC-File-XML-2014-1626"}],"main_module":"MARC::File::XML","versions":[{"date":"2017-05-24T01:18:18","version":"v1.0.5"}]},"Mite":{"main_module":"Mite","versions":[{"version":"v0.0.1","date":"2014-07-29T21:10:24"},{"date":"2022-06-21T17:04:26","version":"v0.0.2"},{"version":"v0.0.3","date":"2022-06-21T20:35:06"},{"version":"v0.0.4","date":"2022-06-22T01:18:18"},{"version":"v0.0.5","date":"2022-06-22T12:41:26"},{"date":"2022-06-23T13:34:32","version":"v0.0.6"},{"date":"2022-06-23T19:39:49","version":"v0.0.7"},{"date":"2022-06-24T12:23:18","version":"v0.0.8"},{"date":"2022-06-28T12:54:37","version":"v0.0.9"},{"date":"2022-06-28T16:33:12","version":"0.001000"},{"date":"2022-06-28T23:23:27","version":"0.001001"},{"version":"0.001002","date":"2022-06-29T00:14:33"},{"version":"0.001003","date":"2022-06-29T00:23:14"},{"date":"2022-06-29T09:48:18","version":"0.001004"},{"version":"0.001005","date":"2022-06-29T10:47:18"},{"version":"0.001006","date":"2022-06-29T13:26:40"},{"version":"0.001007","date":"2022-06-29T15:01:20"},{"date":"2022-06-29T17:18:46","version":"0.001008"},{"version":"0.001009","date":"2022-06-29T17:24:52"},{"date":"2022-06-29T22:02:50","version":"0.001010"},{"version":"0.001011","date":"2022-06-29T23:15:21"},{"version":"0.001012","date":"2022-06-30T13:09:55"},{"version":"0.001013","date":"2022-06-30T20:52:53"},{"date":"2022-07-01T16:08:26","version":"0.002000"},{"version":"0.002001","date":"2022-07-01T17:12:53"},{"version":"0.002002","date":"2022-07-01T20:55:40"},{"version":"0.002003","date":"2022-07-02T19:31:17"},{"version":"0.002004","date":"2022-07-02T23:37:00"},{"date":"2022-07-03T08:50:07","version":"0.003000"},{"version":"0.003001","date":"2022-07-03T11:21:56"},{"date":"2022-07-04T20:27:47","version":"0.004000"},{"date":"2022-07-05T18:08:58","version":"0.005000"},{"version":"0.005001","date":"2022-07-06T13:32:59"},{"version":"0.005002","date":"2022-07-07T08:21:36"},{"version":"0.005003","date":"2022-07-08T12:14:54"},{"date":"2022-07-08T21:28:24","version":"0.005004"},{"version":"0.006000","date":"2022-07-09T16:14:35"},{"version":"0.006001","date":"2022-07-09T18:08:05"},{"date":"2022-07-10T10:32:50","version":"0.006002"},{"version":"0.006003","date":"2022-07-10T10:36:37"},{"version":"0.006004","date":"2022-07-10T11:56:49"},{"date":"2022-07-10T16:37:45","version":"0.006005"},{"version":"0.006006","date":"2022-07-10T19:55:04"},{"date":"2022-07-11T08:10:46","version":"0.006007"},{"date":"2022-07-11T13:14:24","version":"0.006008"},{"version":"0.006009","date":"2022-07-11T20:17:03"},{"date":"2022-07-12T12:19:49","version":"0.006010"},{"date":"2022-07-12T13:45:58","version":"0.006011"},{"version":"0.006012","date":"2022-07-13T12:26:42"},{"date":"2022-07-14T20:44:28","version":"0.006013"},{"version":"0.007000","date":"2022-07-16T23:12:32"},{"date":"2022-07-17T08:15:25","version":"0.007001"},{"version":"0.007002","date":"2022-07-17T08:57:45"},{"version":"0.007003","date":"2022-07-17T11:24:15"},{"version":"0.007004","date":"2022-07-20T09:23:13"},{"date":"2022-07-21T13:07:18","version":"0.007005"},{"date":"2022-07-21T20:44:59","version":"0.007006"},{"version":"0.008000","date":"2022-08-01T16:50:24"},{"date":"2022-08-03T14:18:10","version":"0.008001"},{"date":"2022-08-03T16:55:42","version":"0.008002"},{"version":"0.008003","date":"2022-08-04T23:53:31"},{"version":"0.009000","date":"2022-08-07T16:16:40"},{"version":"0.009001","date":"2022-08-08T12:49:01"},{"date":"2022-08-08T16:16:56","version":"0.009002"},{"version":"0.009003","date":"2022-08-08T18:19:51"},{"version":"0.010000","date":"2022-08-09T18:41:15"},{"version":"0.010001","date":"2022-08-09T21:40:29"},{"date":"2022-08-12T10:21:24","version":"0.010002"},{"version":"0.010003","date":"2022-08-12T15:46:11"},{"version":"0.010004","date":"2022-08-13T08:14:34"},{"version":"0.010005","date":"2022-08-13T13:06:05"},{"version":"0.010006","date":"2022-08-14T13:54:50"},{"version":"0.010007","date":"2022-08-14T14:03:09"},{"date":"2022-08-15T14:16:11","version":"0.010008"},{"version":"0.011000","date":"2022-11-09T15:20:39"},{"date":"2022-12-12T20:44:49","version":"0.012000"},{"version":"0.013000","date":"2025-03-31T10:59:29"}],"advisories":[{"references":["https://blogs.perl.org/users/todd_rinaldo/2016/11/what-happened-to-dot-in-inc.html","https://metacpan.org/release/TOBYINK/Mite-0.013000/changes","https://perldoc.perl.org/perlrun#PERL_USE_UNSAFE_INC","https://wiki.gentoo.org/wiki/Project:Perl/Dot-In-INC-Removal"],"affected_versions":["<0.013000"],"severity":null,"description":"Mite for Perl before 0.013000 generates code with the current working directory ('.') added to the @INC path similar to CVE-2016-1238. If an attacker can place a malicious file in current working directory, it may be loaded instead of the intended file, potentially leading to arbitrary code execution. This affects the Mite distribution itself, and other distributions that contain code generated by Mite.","distribution":"Mite","reported":"2025-04-01","fixed_versions":[">=0.013000"],"cves":["CVE-2025-30672"],"id":"CPANSA-Mite-2025-30672"}]},"POE-Component-IRC":{"versions":[{"version":"1.0","date":"2001-01-14T01:08:55"},{"date":"2001-02-21T23:20:30","version":"1.0"},{"version":"1.1","date":"2001-03-02T11:10:34"},{"version":"1.2","date":"2001-05-24T09:39:58"},{"date":"2001-07-01T00:29:06","version":"1.3"},{"version":"1.4","date":"2001-07-03T00:23:58"},{"date":"2001-07-05T22:29:01","version":"1.5"},{"version":"1.6","date":"2001-07-07T02:07:09"},{"date":"2001-07-21T08:09:18","version":"1.7"},{"version":"1.8","date":"2001-12-11T00:06:53"},{"version":"1.9","date":"2001-12-13T07:07:40"},{"date":"2002-02-22T23:26:52","version":"2.0"},{"date":"2002-03-05T01:19:43","version":"2.1"},{"version":"2.2","date":"2002-05-24T20:54:40"},{"date":"2002-09-06T15:29:09","version":"2.3"},{"version":"2.4","date":"2002-10-10T21:24:56"},{"version":"2.5","date":"2002-10-27T19:02:42"},{"version":"2.6","date":"2002-12-12T04:30:15"},{"date":"2003-02-02T23:23:52","version":"2.7"},{"version":"2.8","date":"2003-06-07T23:25:07"},{"date":"2003-07-19T20:38:58","version":"2.9"},{"version":"3.0","date":"2004-12-31T13:57:37"},{"date":"2005-01-21T12:36:21","version":"3.1"},{"version":"3.2","date":"2005-02-02T11:58:41"},{"date":"2005-02-02T14:17:25","version":"3.3"},{"version":"3.4","date":"2005-02-18T15:40:19"},{"date":"2005-02-23T13:35:13","version":"3.4"},{"date":"2005-03-01T18:10:05","version":"3.4"},{"date":"2005-03-04T17:53:49","version":"3.4"},{"date":"2005-03-14T10:31:33","version":"3.4"},{"date":"2005-03-21T09:24:00","version":"3.4"},{"date":"2005-04-05T09:50:19","version":"4.0"},{"version":"4.1","date":"2005-04-11T10:31:43"},{"version":"4.2","date":"2005-04-14T19:46:49"},{"date":"2005-04-20T08:35:06","version":"4.3"},{"date":"2005-04-28T14:23:29","version":"4.4"},{"version":"4.5","date":"2005-05-22T15:26:46"},{"version":"4.6","date":"2005-06-01T14:33:57"},{"date":"2005-06-02T09:53:57","version":"4.61"},{"version":"4.62","date":"2005-06-02T15:47:47"},{"date":"2005-06-16T21:03:43","version":"4.63"},{"date":"2005-07-05T15:28:06","version":"4.64"},{"version":"4.65","date":"2005-07-13T16:52:52"},{"date":"2005-07-28T17:16:01","version":"4.66"},{"version":"4.67","date":"2005-08-25T13:31:53"},{"date":"2005-09-02T12:35:28","version":"4.68"},{"version":"4.69","date":"2005-09-05T11:27:29"},{"date":"2005-09-16T15:59:06","version":"4.70"},{"version":"4.71","date":"2005-10-13T18:10:10"},{"date":"2005-10-25T18:07:42","version":"4.72"},{"date":"2005-10-26T06:43:59","version":"4.73"},{"version":"4.74","date":"2005-10-26T08:21:25"},{"version":"4.75","date":"2005-12-04T17:50:30"},{"version":"4.76","date":"2005-12-23T15:22:40"},{"version":"4.77","date":"2005-12-26T17:08:35"},{"date":"2006-01-10T22:07:46","version":"4.78"},{"date":"2006-01-15T17:09:57","version":"4.79"},{"version":"4.80","date":"2006-03-16T16:53:54"},{"date":"2006-03-31T16:02:38","version":"4.81"},{"date":"2006-04-11T18:38:36","version":"4.82"},{"version":"4.83","date":"2006-04-11T19:50:58"},{"version":"4.84","date":"2006-04-12T13:40:40"},{"version":"4.85","date":"2006-04-13T11:43:55"},{"date":"2006-04-27T20:45:17","version":"4.86"},{"version":"4.87","date":"2006-05-06T16:13:30"},{"version":"4.88","date":"2006-05-21T17:09:49"},{"date":"2006-05-22T08:21:25","version":"4.89"},{"version":"4.90","date":"2006-05-22T12:56:03"},{"version":"4.91","date":"2006-06-01T20:15:32"},{"version":"4.92","date":"2006-06-11T17:15:17"},{"version":"4.93","date":"2006-06-13T18:29:21"},{"date":"2006-07-02T09:10:52","version":"4.94"},{"version":"4.95","date":"2006-07-05T10:47:35"},{"version":"4.96","date":"2006-07-16T13:37:50"},{"version":"4.97","date":"2006-07-24T11:55:01"},{"date":"2006-08-18T11:39:13","version":"4.98"},{"version":"4.99","date":"2006-08-29T16:57:17"},{"version":"5.00","date":"2006-09-01T01:32:30"},{"version":"5.01","date":"2006-09-07T17:03:08"},{"date":"2006-09-08T15:45:55","version":"5.02"},{"version":"5.03","date":"2006-09-16T13:33:43"},{"date":"2006-09-25T12:40:35","version":"5.04"},{"date":"2006-10-06T14:02:37","version":"5.05"},{"date":"2006-10-12T12:29:17","version":"5.06"},{"version":"5.07","date":"2006-10-17T10:57:25"},{"version":"5.08","date":"2006-10-23T12:43:37"},{"version":"5.09","date":"2006-10-24T14:15:06"},{"version":"5.10","date":"2006-10-24T17:18:06"},{"version":"5.11","date":"2006-10-25T15:51:16"},{"version":"5.12","date":"2006-11-16T14:01:15"},{"version":"5.13","date":"2006-11-19T14:34:09"},{"date":"2006-11-29T11:10:54","version":"5.14"},{"date":"2006-12-05T19:42:12","version":"5.15"},{"version":"5.16","date":"2006-12-06T12:27:38"},{"date":"2006-12-12T23:09:26","version":"5.17"},{"date":"2006-12-29T11:08:52","version":"5.18"},{"date":"2007-01-31T12:06:39","version":"5.19"},{"version":"5.20","date":"2007-01-31T17:37:46"},{"version":"5.21","date":"2007-02-01T12:39:18"},{"date":"2007-02-02T12:55:07","version":"5.22"},{"date":"2007-04-12T15:28:46","version":"5.23"},{"version":"5.24","date":"2007-04-16T12:51:48"},{"date":"2007-04-29T12:19:32","version":"5.25"},{"version":"5.26","date":"2007-04-29T14:33:13"},{"date":"2007-05-01T13:21:57","version":"5.27"},{"version":"5.28","date":"2007-05-01T14:14:27"},{"date":"2007-05-03T12:51:34","version":"5.29"},{"version":"5.30","date":"2007-05-08T18:38:59"},{"version":"5.31_01","date":"2007-05-18T09:26:43"},{"date":"2007-05-31T15:25:34","version":"5.31_02"},{"version":"5.31_03","date":"2007-06-01T10:02:23"},{"version":"5.31_04","date":"2007-06-05T08:46:20"},{"date":"2007-06-11T09:30:57","version":"5.31_05"},{"date":"2007-06-12T11:28:18","version":"5.32"},{"date":"2007-07-10T17:11:05","version":"5.33_01"},{"date":"2007-07-25T10:01:32","version":"5.34"},{"version":"5.36","date":"2007-11-01T14:32:47"},{"version":"5.37_01","date":"2007-12-05T21:26:00"},{"date":"2007-12-06T08:53:09","version":"5.37_02"},{"version":"5.38","date":"2007-12-06T17:35:01"},{"version":"5.40","date":"2007-12-26T11:03:08"},{"date":"2007-12-31T12:44:42","version":"5.42"},{"date":"2008-01-01T14:10:56","version":"5.44"},{"version":"5.46","date":"2008-01-03T15:21:36"},{"version":"5.48","date":"2008-01-10T20:32:12"},{"version":"5.50","date":"2008-01-13T10:30:41"},{"version":"5.52","date":"2008-01-14T08:06:32"},{"date":"2008-01-27T09:43:44","version":"5.54"},{"version":"5.56","date":"2008-01-31T13:13:54"},{"date":"2008-02-04T08:13:31","version":"5.58"},{"date":"2008-02-06T13:54:09","version":"5.60"},{"version":"5.62","date":"2008-02-07T16:42:54"},{"date":"2008-02-16T08:35:10","version":"5.64"},{"version":"5.66","date":"2008-02-18T22:11:13"},{"version":"5.68","date":"2008-02-20T20:00:00"},{"date":"2008-03-03T10:51:33","version":"5.70"},{"version":"5.72","date":"2008-03-21T10:56:45"},{"version":"5.74","date":"2008-04-02T15:23:28"},{"version":"5.76","date":"2008-04-24T15:13:29"},{"version":"5.78","date":"2008-05-30T07:16:00"},{"date":"2008-06-12T15:42:21","version":"5.80"},{"version":"5.82","date":"2008-06-14T08:49:07"},{"date":"2008-06-26T19:16:22","version":"5.84"},{"version":"5.86","date":"2008-07-22T09:11:40"},{"date":"2008-08-28T15:06:57","version":"5.88"},{"date":"2009-01-22T11:04:20","version":"5.90"},{"date":"2009-01-27T13:08:53","version":"5.92"},{"version":"5.94","date":"2009-01-27T21:56:50"},{"date":"2009-01-28T12:02:40","version":"5.96"},{"date":"2009-03-02T23:16:08","version":"5.98"},{"version":"6.00","date":"2009-03-04T23:31:34"},{"version":"6.02","date":"2009-03-06T11:07:07"},{"date":"2009-03-07T23:41:08","version":"6.04"},{"date":"2009-04-11T09:24:16","version":"6.05_01"},{"version":"6.06","date":"2009-04-30T12:12:52"},{"date":"2009-05-29T11:58:02","version":"6.08"},{"date":"2009-07-09T20:20:10","version":"6.09_01"},{"version":"6.09_02","date":"2009-07-10T09:17:48"},{"date":"2009-07-10T14:24:17","version":"6.09_03"},{"date":"2009-07-12T20:52:44","version":"6.09_04"},{"date":"2009-07-16T14:20:12","version":"6.09_05"},{"version":"6.09_06","date":"2009-07-17T10:23:41"},{"date":"2009-07-21T06:26:37","version":"6.09_07"},{"version":"6.09_08","date":"2009-07-27T12:19:55"},{"version":"6.09_09","date":"2009-07-29T11:16:27"},{"version":"6.09_10","date":"2009-07-30T13:40:56"},{"date":"2009-08-07T12:59:58","version":"6.09_11"},{"version":"6.10","date":"2009-08-14T20:49:04"},{"version":"6.11_01","date":"2009-08-19T09:21:27"},{"date":"2009-09-10T09:00:17","version":"6.12"},{"version":"6.14","date":"2009-09-24T15:13:45"},{"date":"2009-10-11T09:02:32","version":"6.16"},{"date":"2009-12-11T19:28:22","version":"6.18"},{"date":"2010-01-15T18:42:20","version":"6.20"},{"version":"6.22","date":"2010-01-20T01:54:34"},{"date":"2010-02-12T02:47:46","version":"6.24"},{"date":"2010-03-14T07:34:45","version":"6.26"},{"version":"6.28","date":"2010-03-14T10:57:17"},{"date":"2010-05-10T14:40:23","version":"6.30"},{"version":"6.32","date":"2010-05-11T13:45:23"},{"date":"2010-06-21T20:28:42","version":"6.33"},{"date":"2010-06-25T18:17:14","version":"6.34"},{"date":"2010-06-27T09:33:18","version":"6.35"},{"version":"6.36","date":"2010-07-26T03:54:08"},{"date":"2010-08-17T23:08:39","version":"6.37"},{"date":"2010-09-03T18:33:58","version":"6.38"},{"version":"6.39","date":"2010-09-04T02:16:21"},{"date":"2010-09-09T06:56:17","version":"6.40"},{"date":"2010-09-23T21:34:09","version":"6.41"},{"version":"6.42","date":"2010-09-25T09:40:47"},{"version":"6.43","date":"2010-09-25T21:30:54"},{"version":"6.44","date":"2010-09-25T23:35:19"},{"date":"2010-09-26T03:42:36","version":"6.45"},{"version":"6.46","date":"2010-09-29T04:59:09"},{"date":"2010-10-03T15:29:13","version":"6.47"},{"date":"2010-10-03T19:50:31","version":"6.48"},{"date":"2010-10-16T19:05:02","version":"6.49"},{"date":"2010-11-03T02:06:04","version":"6.50"},{"version":"6.51","date":"2010-11-05T11:29:30"},{"version":"6.52","date":"2010-11-05T17:26:55"},{"version":"6.53","date":"2011-03-10T15:39:11"},{"version":"6.54","date":"2011-03-10T18:21:18"},{"date":"2011-04-01T18:38:19","version":"6.55"},{"date":"2011-04-01T20:05:44","version":"6.56"},{"date":"2011-04-02T03:41:42","version":"6.57"},{"version":"6.58","date":"2011-04-04T17:52:07"},{"date":"2011-04-04T20:23:21","version":"6.59"},{"date":"2011-04-15T06:13:37","version":"6.60"},{"version":"6.61","date":"2011-04-19T17:04:11"},{"date":"2011-05-03T11:00:14","version":"6.62"},{"version":"6.63","date":"2011-05-15T05:08:04"},{"date":"2011-05-15T10:00:34","version":"6.64"},{"version":"6.65","date":"2011-05-19T01:55:49"},{"date":"2011-05-19T22:33:07","version":"6.66"},{"version":"6.67","date":"2011-05-22T16:45:17"},{"date":"2011-05-22T17:02:27","version":"6.68"},{"version":"6.69","date":"2011-07-29T01:54:20"},{"version":"6.70","date":"2011-08-02T03:40:17"},{"date":"2011-09-18T16:08:38","version":"6.71"},{"date":"2011-10-07T15:42:11","version":"6.72"},{"version":"6.73","date":"2011-10-08T04:41:24"},{"date":"2011-10-09T20:16:25","version":"6.74"},{"date":"2011-11-13T14:26:23","version":"6.75"},{"version":"6.76","date":"2011-11-29T03:25:52"},{"version":"6.77","date":"2011-12-02T03:56:47"},{"version":"6.78","date":"2011-12-07T20:30:42"},{"date":"2012-09-19T13:26:08","version":"6.79"},{"date":"2012-09-20T08:55:35","version":"6.80"},{"version":"6.81","date":"2012-11-23T15:56:03"},{"version":"6.82","date":"2013-03-09T22:17:24"},{"date":"2013-05-27T09:43:25","version":"6.83"},{"version":"6.84","date":"2014-06-17T09:47:20"},{"version":"6.85","date":"2014-06-19T09:22:12"},{"version":"6.86","date":"2014-06-20T10:14:59"},{"version":"6.87","date":"2014-06-21T14:09:46"},{"version":"6.88","date":"2014-06-28T12:16:18"},{"date":"2017-09-05T18:14:17","version":"6.89"},{"date":"2017-09-05T18:19:13","version":"6.90"},{"date":"2021-06-05T12:55:31","version":"6.91"},{"date":"2021-06-08T13:32:11","version":"6.92"},{"version":"6.93","date":"2021-06-15T18:29:10"}],"main_module":"POE::Component::IRC","advisories":[{"id":"CPANSA-Poe-Component-IRC-2010-3438","description":"libpoe-component-irc-perl before v6.32 does not remove carriage returns and line feeds. This can be used to execute arbitrary IRC commands by passing an argument such as \\\"some text\\\\rQUIT\\\" to the 'privmsg' handler, which would cause the client to disconnect from the server.\n","distribution":"POE-Component-IRC","fixed_versions":[],"reported":"2019-11-12","cves":["CVE-2010-3438"],"severity":"critical","references":["https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=581194","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-3438","https://security-tracker.debian.org/tracker/CVE-2010-3438"],"affected_versions":["<6.32"]}]},"XML-DT":{"advisories":[{"severity":null,"references":["http://openwall.com/lists/oss-security/2014/08/15/8","https://metacpan.org/diff/file?target=AMBS/XML-DT-0.64/&source=AMBS/XML-DT-0.63/","https://metacpan.org/source/AMBS/XML-DT-0.66/Changes","https://bugs.debian.org/756566"],"affected_versions":["<0.64"],"id":"CPANSA-XML-DT-2014-5260","reported":"2014-08-16","cves":["CVE-2014-5260"],"fixed_versions":[],"description":"The (1) mkxmltype and (2) mkdtskel scripts in XML-DT before 0.64 allow local users to overwrite arbitrary files via a symlink attack on a /tmp/_xml_##### temporary file.\n","distribution":"XML-DT"}],"main_module":"XML::DT","versions":[{"date":"1999-07-30T13:04:11","version":"0.11"},{"date":"2000-04-07T09:24:55","version":"0.14"},{"version":"0.15","date":"2000-09-19T17:03:40"},{"version":"0.16","date":"2000-10-16T16:21:54"},{"date":"2000-11-30T12:37:27","version":"0.19"},{"version":"0.20","date":"2002-03-07T17:54:06"},{"date":"2002-05-28T12:35:07","version":"0.21"},{"date":"2002-12-20T17:31:58","version":"0.22"},{"date":"2002-12-27T09:10:47","version":"0.23"},{"date":"2003-02-20T16:16:43","version":"0.24"},{"version":"v0.24.1","date":"2003-06-17T10:15:16"},{"version":"0.25","date":"2003-10-09T08:12:32"},{"date":"2003-10-13T07:47:22","version":"0.25"},{"version":"0.27","date":"2003-11-14T10:55:50"},{"version":"0.28","date":"2003-12-16T14:25:13"},{"version":"0.29","date":"2004-01-07T11:38:24"},{"version":"0.30","date":"2004-01-22T11:25:21"},{"version":"0.31","date":"2004-08-09T17:43:41"},{"date":"2004-09-20T19:15:56","version":"0.32"},{"version":"0.33","date":"2004-10-03T19:21:18"},{"version":"0.34","date":"2004-10-30T14:43:29"},{"version":"0.35","date":"2004-11-15T16:39:19"},{"version":"0.36","date":"2004-11-19T17:29:05"},{"date":"2004-11-21T16:27:45","version":"0.37"},{"date":"2004-12-24T16:34:24","version":"0.38"},{"version":"0.39","date":"2005-03-22T12:05:18"},{"date":"2005-04-06T08:14:46","version":"0.40"},{"version":"0.41","date":"2005-07-20T20:28:06"},{"date":"2005-09-18T16:06:11","version":"0.42"},{"date":"2006-05-15T09:08:21","version":"0.43"},{"version":"0.44","date":"2006-05-15T09:33:07"},{"version":"0.45","date":"2006-05-16T14:14:36"},{"date":"2006-11-03T09:39:12","version":"0.46"},{"version":"0.47","date":"2006-11-23T18:14:09"},{"version":"0.48","date":"2008-02-20T22:00:02"},{"version":"0.49","date":"2008-02-20T22:16:45"},{"date":"2008-02-21T22:02:53","version":"0.50"},{"version":"0.51","date":"2008-02-22T17:19:12"},{"version":"0.52","date":"2008-10-22T09:12:08"},{"date":"2009-01-18T20:10:36","version":"0.53"},{"date":"2010-11-19T16:27:23","version":"0.54"},{"version":"0.55","date":"2011-02-12T22:08:27"},{"version":"0.56","date":"2011-02-12T22:09:55"},{"version":"0.57","date":"2012-04-07T20:30:58"},{"date":"2012-04-09T10:19:15","version":"0.58"},{"version":"0.59","date":"2012-06-05T13:37:08"},{"date":"2012-06-25T16:57:54","version":"0.60"},{"date":"2012-06-25T17:04:58","version":"0.61"},{"date":"2012-06-25T19:02:40","version":"0.62"},{"date":"2013-03-25T22:27:48","version":"0.63"},{"date":"2014-07-31T19:46:44","version":"0.64"},{"version":"0.65","date":"2014-08-01T13:00:43"},{"version":"0.66","date":"2014-08-15T20:17:39"},{"version":"0.67","date":"2015-03-15T18:28:49"},{"date":"2015-09-29T08:06:14","version":"0.68"},{"version":"0.69","date":"2019-04-22T17:01:30"}]},"FCGI":{"advisories":[{"cves":["CVE-2011-2766"],"reported":"2011-09-24","fixed_versions":[">=0.74"],"distribution":"FCGI","description":"Leaking information across requests when using the deprecated and undocumented old FCGI interface.\n","id":"CPANSA-FCGI-2011-01","affected_versions":["<0.74"],"references":["https://metacpan.org/changes/distribution/FCGI","https://github.com/perl-catalyst/FCGI/commit/297693dc8362d25bb25e473899c72508a0f71d2e"]}],"versions":[{"version":"0.25","date":"1996-09-25T17:48:57"},{"version":"0.26","date":"1996-10-15T21:51:06"},{"version":"0.27","date":"1997-02-20T08:55:44"},{"date":"1997-02-25T07:14:13","version":"0.28"},{"date":"1997-06-10T18:16:17","version":"0.29"},{"date":"1997-06-24T17:17:05","version":"0.30"},{"version":"0.31","date":"1997-07-24T11:05:43"},{"date":"1998-06-17T10:24:17","version":"0.34"},{"date":"1998-06-22T15:38:51","version":"0.35"},{"version":"0.36","date":"1998-06-24T19:42:57"},{"version":"0.37","date":"1998-06-27T16:08:39"},{"version":"0.40","date":"1998-07-15T15:24:00"},{"date":"1998-07-29T16:05:51","version":"0.41"},{"version":"0.42","date":"1998-08-28T15:30:49"},{"version":"0.43","date":"1998-12-22T22:34:14"},{"version":"0.44","date":"1998-12-23T11:28:39"},{"version":"0.45","date":"1999-03-08T17:04:02"},{"version":"0.46","date":"1999-07-30T08:26:31"},{"date":"1999-07-31T21:58:01","version":"0.47"},{"version":"0.48","date":"1999-08-27T13:41:54"},{"version":"0.49","date":"2000-04-09T18:58:32"},{"version":"0.50","date":"2000-04-10T07:04:43"},{"date":"2000-04-12T12:27:09","version":"0.51"},{"date":"2000-04-12T14:10:02","version":"0.52"},{"version":"0.53","date":"2000-07-10T10:01:51"},{"version":"0.54","date":"2000-10-08T19:52:29"},{"version":"0.55","date":"2000-10-18T21:22:46"},{"version":"0.56","date":"2000-11-03T15:44:28"},{"date":"2000-11-12T15:15:01","version":"0.57"},{"version":"0.58","date":"2000-11-14T23:20:24"},{"version":"0.59","date":"2000-12-31T22:05:44"},{"date":"2001-06-08T15:19:08","version":"0.60"},{"version":"0.61","date":"2001-09-20T12:34:13"},{"version":"0.62","date":"2001-09-21T16:19:42"},{"version":"0.63","date":"2001-09-24T20:43:48"},{"date":"2001-09-25T08:26:24","version":"0.64"},{"version":"0.65","date":"2002-02-19T14:16:27"},{"version":"0.66","date":"2002-09-05T16:23:07"},{"version":"0.67","date":"2002-12-23T10:21:36"},{"date":"2009-12-20T21:05:48","version":"0.67_01"},{"date":"2010-01-06T10:07:05","version":"0.68"},{"date":"2010-01-10T01:35:11","version":"0.68_01"},{"date":"2010-01-13T19:25:40","version":"0.68_02"},{"date":"2010-02-15T23:08:12","version":"0.69"},{"version":"0.70","date":"2010-03-22T14:35:03"},{"version":"0.71","date":"2010-04-01T00:55:33"},{"date":"2010-08-24T21:32:56","version":"0.71_01"},{"date":"2011-04-28T08:50:09","version":"0.71_02"},{"version":"0.71_03","date":"2011-04-28T09:05:42"},{"date":"2011-05-19T09:06:02","version":"0.72"},{"version":"0.73","date":"2011-05-28T01:35:17"},{"version":"0.74","date":"2011-09-24T08:31:47"},{"date":"2014-07-17T00:19:02","version":"0.75"},{"date":"2014-08-05T01:29:06","version":"0.76"},{"date":"2014-08-05T15:53:28","version":"0.77"},{"version":"0.78","date":"2016-03-07T00:08:23"},{"date":"2019-12-14T18:29:19","version":"0.79"},{"date":"2021-07-25T04:54:49","version":"0.80"},{"date":"2021-07-30T23:19:01","version":"0.81"},{"version":"0.82","date":"2021-07-31T03:26:34"}],"main_module":"FCGI"},"IPC-Cmd":{"advisories":[{"cves":["CVE-2016-1238"],"reported":"2016-08-02","fixed_versions":[">=0.96"],"description":"(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","distribution":"IPC-Cmd","id":"CPANSA-IPC-Cmd-2016-1238","references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"affected_versions":["<0.96"],"severity":"high"}],"versions":[{"version":"0.02","date":"2003-05-10T16:57:39"},{"version":"0.03","date":"2003-05-11T08:50:33"},{"date":"2003-09-25T10:34:58","version":"0.04"},{"version":"0.20","date":"2004-06-18T11:43:01"},{"version":"0.22","date":"2004-08-16T10:26:03"},{"date":"2004-12-03T15:53:45","version":"0.23"},{"version":"0.24","date":"2004-12-09T09:56:18"},{"date":"2006-09-06T15:57:50","version":"0.25"},{"date":"2006-10-05T14:42:36","version":"0.29_01"},{"date":"2006-10-11T11:11:24","version":"0.30"},{"version":"0.32","date":"2006-10-13T11:18:04"},{"date":"2006-10-20T13:16:49","version":"0.34"},{"version":"0.36","date":"2006-11-24T14:01:10"},{"date":"2007-10-11T15:17:44","version":"0.38"},{"version":"0.40","date":"2007-10-17T09:29:57"},{"date":"2008-05-18T15:50:12","version":"0.41_01"},{"date":"2008-06-29T15:41:17","version":"0.41_02"},{"version":"0.41_03","date":"2008-07-13T13:08:43"},{"version":"0.41_04","date":"2008-07-14T13:57:54"},{"version":"0.41_05","date":"2008-09-22T13:12:26"},{"date":"2008-09-24T15:46:32","version":"0.41_06"},{"version":"0.41_07","date":"2008-10-05T16:24:49"},{"version":"0.42","date":"2008-10-10T09:47:07"},{"version":"0.44","date":"2009-05-04T08:15:08"},{"version":"0.46","date":"2009-06-12T11:38:40"},{"date":"2009-09-07T14:15:59","version":"0.48"},{"version":"0.50","date":"2009-09-07T15:21:24"},{"version":"0.51_01","date":"2009-11-08T23:24:39"},{"version":"0.52","date":"2009-11-13T16:17:59"},{"date":"2009-11-15T22:04:56","version":"0.54"},{"date":"2010-02-03T14:21:25","version":"0.56"},{"version":"0.58","date":"2010-04-29T20:06:40"},{"version":"0.60","date":"2010-07-05T08:10:45"},{"version":"0.62","date":"2010-10-19T14:53:57"},{"version":"0.64","date":"2010-10-19T18:09:00"},{"version":"0.66","date":"2010-11-23T12:11:55"},{"date":"2011-01-07T22:28:30","version":"0.68"},{"version":"0.70","date":"2011-01-31T20:40:13"},{"version":"0.71_01","date":"2011-05-10T13:07:15"},{"version":"0.71_02","date":"2011-05-26T12:01:30"},{"date":"2011-05-26T12:46:44","version":"0.71_03"},{"date":"2011-06-22T11:34:08","version":"0.72"},{"version":"0.74","date":"2012-01-30T10:35:24"},{"date":"2012-01-30T11:34:12","version":"0.76"},{"date":"2012-04-30T18:52:04","version":"0.78"},{"version":"0.80","date":"2013-03-02T22:15:43"},{"date":"2013-06-29T21:17:06","version":"0.82"},{"version":"0.84","date":"2013-08-06T09:28:59"},{"date":"2013-09-05T19:34:47","version":"0.85_01"},{"version":"0.85_02","date":"2013-10-10T13:09:11"},{"version":"0.86","date":"2013-11-04T14:18:01"},{"date":"2013-11-15T14:47:57","version":"0.88"},{"date":"2013-11-18T15:12:15","version":"0.90"},{"version":"0.92","date":"2014-01-22T20:01:22"},{"version":"0.94","date":"2016-02-12T19:01:25"},{"date":"2016-07-28T10:19:44","version":"0.96"},{"version":"0.98","date":"2017-05-12T16:05:02"},{"date":"2018-02-14T16:21:01","version":"1.00"},{"date":"2018-05-03T08:53:01","version":"1.02"},{"date":"2019-07-13T09:17:39","version":"1.04"},{"date":"2007-07-07T00:00:00","version":"0.36_01","dual_lived":1,"perl_release":"5.009005"},{"dual_lived":1,"version":"0.40_1","perl_release":"5.010000","date":"2007-12-18T00:00:00"},{"perl_release":"5.019005","dual_lived":1,"version":"0.84_01","date":"2013-10-20T00:00:00"},{"date":"2017-01-14T00:00:00","perl_release":"5.022003","dual_lived":1,"version":"0.92_01"}],"main_module":"IPC::Cmd"},"PApp":{"main_module":"PApp","versions":[{"version":"0.02","date":"2000-04-11T19:29:07"},{"date":"2000-04-14T01:33:03","version":"0.03"},{"date":"2000-05-11T01:27:39","version":"0.04"},{"date":"2000-05-27T20:43:50","version":"0.05"},{"date":"2000-06-07T19:56:36","version":"0.06"},{"version":"0.07","date":"2000-06-09T20:15:48"},{"version":"0.08","date":"2000-06-18T21:57:46"},{"date":"2001-02-25T17:23:00","version":"0.12"},{"date":"2001-11-30T10:35:30","version":"0.121"},{"date":"2001-12-03T18:35:13","version":"0.122"},{"version":"0.142","date":"2002-04-16T17:20:02"},{"version":"0.143","date":"2002-09-27T09:55:48"},{"date":"2002-11-15T19:09:27","version":"0.2"},{"version":"0.22","date":"2003-11-01T21:22:27"},{"date":"2004-04-24T07:18:03","version":"0.95"},{"date":"2004-11-23T17:16:58","version":"1"},{"date":"2005-09-04T14:32:15","version":"1.1"},{"date":"2007-01-06T19:32:19","version":"1.2"},{"version":"1.4","date":"2008-01-20T12:37:14"},{"version":"1.41","date":"2008-01-28T20:07:08"},{"version":"1.42","date":"2008-11-26T07:18:45"},{"version":"1.43","date":"2008-12-09T17:23:32"},{"date":"2010-01-30T03:08:38","version":"1.44"},{"version":"1.45","date":"2010-11-21T07:30:21"},{"version":"2.0","date":"2013-03-19T12:24:55"},{"date":"2016-02-11T07:21:31","version":2.1},{"version":2.2,"date":"2020-02-17T11:04:59"},{"date":"2023-08-02T22:30:09","version":2.3}],"advisories":[{"id":"CPANSA-PApp-2001-01","cves":[],"reported":"2001-10-27","fixed_versions":[">=0.11"],"distribution":"PApp","description":"Testing for nonexistant access rights always returned true.\n","severity":null,"affected_versions":["<0.11"],"references":["https://metacpan.org/dist/PApp/changes"]}]},"File-Path":{"advisories":[{"id":"CPANSA-File-Path-2017-01","reported":"2017-05-02","fixed_versions":[">=2.13"],"cves":["CVE-2017-6512"],"distribution":"File-Path","description":"Race condition in the rmtree and remove_tree functions allows attackers to set the mode on arbitrary files via vectors involving directory-permission loosening logic.\n","references":["https://metacpan.org/changes/distribution/File-Path","https://github.com/jkeenan/File-Path/commit/e5ef95276ee8ad471c66ee574a5d42552b3a6af2"],"affected_versions":["<2.13"]},{"affected_versions":["<=1.08"],"references":["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286905","http://www.openwall.com/lists/oss-security/2008/11/28/2","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286922#36","http://www.gossamer-threads.com/lists/perl/porters/233695#233695","http://www.debian.org/security/2008/dsa-1678","http://www.ubuntu.com/usn/usn-700-1","http://secunia.com/advisories/33314","http://wiki.rpath.com/Advisories:rPSA-2009-0011","http://www.ubuntu.com/usn/usn-700-2","http://secunia.com/advisories/32980","http://support.apple.com/kb/HT4077","http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html","http://www.redhat.com/support/errata/RHSA-2010-0458.html","http://secunia.com/advisories/40052","http://www.mandriva.com/security/advisories?name=MDVSA-2010:116","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","https://exchange.xforce.ibmcloud.com/vulnerabilities/47044","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9699","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6680","http://www.securityfocus.com/archive/1/500210/100/0/threaded"],"severity":null,"fixed_versions":[],"reported":"2008-12-01","cves":["CVE-2008-5303"],"distribution":"File-Path","description":"Race condition in the rmtree function in File::Path 1.08 (lib/File/Path.pm) in Perl 5.8.8 allows local users to to delete arbitrary files via a symlink attack, a different vulnerability than CVE-2005-0448, CVE-2004-0452, and CVE-2008-2827. NOTE: this is a regression error related to CVE-2005-0448. It is different from CVE-2008-5302 due to affected versions.\n","id":"CPANSA-File-Path-2008-5303"},{"severity":null,"references":["http://www.gossamer-threads.com/lists/perl/porters/233695#233695","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286922#36","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286905","http://www.openwall.com/lists/oss-security/2008/11/28/2","http://www.debian.org/security/2008/dsa-1678","http://secunia.com/advisories/33314","http://www.ubuntu.com/usn/usn-700-1","http://wiki.rpath.com/Advisories:rPSA-2009-0011","http://www.ubuntu.com/usn/usn-700-2","http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html","http://secunia.com/advisories/32980","http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html","http://support.apple.com/kb/HT4077","http://secunia.com/advisories/40052","http://www.mandriva.com/security/advisories?name=MDVSA-2010:116","http://www.redhat.com/support/errata/RHSA-2010-0458.html","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","https://exchange.xforce.ibmcloud.com/vulnerabilities/47043","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6890","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11076","http://www.securityfocus.com/archive/1/500210/100/0/threaded"],"affected_versions":["=1.08","=2.07"],"id":"CPANSA-File-Path-2008-5302","description":"Race condition in the rmtree function in File::Path 1.08 and 2.07 (lib/File/Path.pm) in Perl 5.8.8 and 5.10.0 allows local users to create arbitrary setuid binaries via a symlink attack, a different vulnerability than CVE-2005-0448, CVE-2004-0452, and CVE-2008-2827. NOTE: this is a regression error related to CVE-2005-0448. It is different from CVE-2008-5303 due to affected versions.\n","distribution":"File-Path","reported":"2008-12-01","fixed_versions":[],"cves":["CVE-2008-5302"]},{"affected_versions":[">=2.04,<2.07"],"references":["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487319","http://rt.cpan.org/Public/Bug/Display.html?id=36982","http://www.securityfocus.com/bid/29902","http://secunia.com/advisories/30790","http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html","http://www.mandriva.com/security/advisories?name=MDVSA-2008:165","https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01025.html","http://secunia.com/advisories/30837","http://secunia.com/advisories/31687","http://www.securitytracker.com/id?1020373","https://exchange.xforce.ibmcloud.com/vulnerabilities/43308"],"severity":null,"distribution":"File-Path","description":"The rmtree function in lib/File/Path.pm in Perl 5.10 does not properly check permissions before performing a chmod, which allows local users to modify the permissions of arbitrary files via a symlink attack, a different vulnerability than CVE-2005-0448 and CVE-2004-0452.\n","reported":"2008-06-23","fixed_versions":[">=2.07"],"cves":["CVE-2008-2827"],"id":"CPANSA-File-Path-2008-2827"},{"references":["http://www.debian.org/security/2005/dsa-696","http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml","http://www.redhat.com/support/errata/RHSA-2005-881.html","http://secunia.com/advisories/18075","http://www.securityfocus.com/bid/12767","ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U","http://secunia.com/advisories/14531","http://secunia.com/advisories/18517","http://fedoranews.org/updates/FEDORA--.shtml","http://www.redhat.com/support/errata/RHSA-2005-674.html","http://secunia.com/advisories/17079","http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056","http://www.mandriva.com/security/advisories?name=MDKSA-2005:079","http://www.securityfocus.com/advisories/8704","http://secunia.com/advisories/55314","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A728","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10475","https://usn.ubuntu.com/94-1/"],"affected_versions":["<1.07"],"severity":null,"cves":["CVE-2005-0448"],"reported":"2005-05-02","fixed_versions":[],"distribution":"File-Path","description":"Race condition in the rmtree function in File::Path.pm in Perl before 5.8.4 allows local users to create arbitrary setuid binaries in the tree being deleted, a different vulnerability than CVE-2004-0452.\n","id":"CPANSA-File-Path-2005-0448"},{"severity":null,"affected_versions":[">=1.06,<=1.404"],"references":["http://www.debian.org/security/2004/dsa-620","http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml","http://www.redhat.com/support/errata/RHSA-2005-103.html","ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U","http://www.securityfocus.com/bid/12072","http://secunia.com/advisories/12991","http://secunia.com/advisories/18517","http://fedoranews.org/updates/FEDORA--.shtml","http://www.redhat.com/support/errata/RHSA-2005-105.html","http://secunia.com/advisories/55314","http://marc.info/?l=bugtraq&m=110547693019788&w=2","https://www.ubuntu.com/usn/usn-44-1/","https://exchange.xforce.ibmcloud.com/vulnerabilities/18650","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9938"],"id":"CPANSA-File-Path-2004-0452","description":"Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack.\n","distribution":"File-Path","fixed_versions":[],"reported":"2004-12-21","cves":["CVE-2004-0452"]}],"versions":[{"date":"2007-05-17T13:46:15","version":"1.99_01"},{"version":"1.99_02","date":"2007-05-27T09:29:48"},{"date":"2007-06-27T19:23:09","version":"2.00_05"},{"version":"2.00_06","date":"2007-07-04T21:37:13"},{"version":"2.00_07","date":"2007-07-09T19:37:02"},{"version":"2.00_08","date":"2007-08-01T00:10:43"},{"date":"2007-08-20T18:15:55","version":"2.00_09"},{"date":"2007-09-04T17:20:45","version":"2.00_10"},{"date":"2007-09-08T12:53:07","version":"2.00_11"},{"version":"2.01","date":"2007-09-29T10:29:32"},{"date":"2007-10-24T10:36:09","version":"2.02"},{"date":"2007-11-04T18:36:19","version":"2.03"},{"date":"2007-11-24T09:53:23","version":"2.04"},{"version":"2.05","date":"2008-05-07T08:25:05"},{"version":"2.06","date":"2008-05-08T09:36:50"},{"date":"2008-05-10T21:02:47","version":"2.06_01"},{"date":"2008-05-12T10:07:46","version":"2.06_02"},{"version":"2.06_03","date":"2008-05-12T21:43:43"},{"version":"2.06_04","date":"2008-05-13T14:40:30"},{"date":"2008-10-01T20:41:37","version":"2.06_05"},{"version":"2.06_06","date":"2008-10-05T21:59:58"},{"version":"2.06_07","date":"2008-10-29T17:55:36"},{"version":"2.06_08","date":"2008-11-05T00:12:29"},{"version":"2.07","date":"2008-11-09T13:11:17"},{"version":"2.07_03","date":"2009-06-21T13:23:32"},{"date":"2009-10-04T10:31:05","version":"2.08"},{"date":"2013-01-16T21:36:05","version":"2.09"},{"version":"2.10_001","date":"2015-06-24T17:03:22"},{"date":"2015-06-26T17:28:20","version":"2.10_002"},{"date":"2015-07-08T16:59:11","version":"2.10_003"},{"date":"2015-07-10T11:34:44","version":"2.10_004"},{"date":"2015-07-17T15:03:07","version":"2.10_005"},{"date":"2015-07-18T02:28:14","version":"2.11"},{"date":"2015-07-24T23:01:36","version":"2.11_001"},{"date":"2015-07-25T09:56:18","version":"2.11_002"},{"version":"2.11_003","date":"2015-08-03T18:07:05"},{"version":"2.11_004","date":"2015-10-01T19:34:07"},{"version":"2.12","date":"2015-10-09T12:11:52"},{"version":"2.12_001","date":"2016-09-18T13:35:39"},{"version":"2.12_002","date":"2017-03-12T22:09:35"},{"version":"2.12_003","date":"2017-04-07T13:59:30"},{"date":"2017-04-18T18:37:56","version":"2.12_004"},{"date":"2017-04-21T12:03:20","version":"2.12_005"},{"date":"2017-04-21T21:58:56","version":"2.12_006"},{"version":"2.12_007","date":"2017-04-22T20:09:24"},{"date":"2017-05-07T17:48:35","version":"2.12_008"},{"version":"2.13","date":"2017-05-31T23:44:51"},{"version":"2.14","date":"2017-06-07T21:34:52"},{"version":"2.15","date":"2017-07-30T02:40:36"},{"version":"2.16","date":"2018-08-31T13:04:13"},{"version":"2.17","date":"2020-07-18T18:29:28"},{"date":"2020-11-04T12:38:02","version":"2.18_001"},{"date":"2020-11-05T01:30:15","version":"2.18"},{"date":"1995-03-14T00:00:00","version":null,"dual_lived":1,"perl_release":"5.001"},{"perl_release":"5.002","version":"1.01","dual_lived":1,"date":"1996-02-29T00:00:00"},{"date":"1997-05-15T00:00:00","dual_lived":1,"version":"1.04","perl_release":"5.004"},{"dual_lived":1,"version":"1.0402","perl_release":"5.00405","date":"1999-04-29T00:00:00"},{"date":"1998-07-22T00:00:00","version":"1.0401","dual_lived":1,"perl_release":"5.005"},{"date":"2000-03-22T00:00:00","perl_release":"5.006000","dual_lived":1,"version":"1.0403"},{"date":"2001-04-08T00:00:00","version":"1.0404","dual_lived":1,"perl_release":"5.006001"},{"perl_release":"5.007003","dual_lived":1,"version":"1.05","date":"2002-03-05T00:00:00"},{"perl_release":"5.008001","version":"1.06","dual_lived":1,"date":"2003-09-25T00:00:00"},{"perl_release":"5.008007","version":"1.07","dual_lived":1,"date":"2005-05-30T00:00:00"},{"date":"2006-01-31T00:00:00","version":"1.08","dual_lived":1,"perl_release":"5.008008"},{"date":"2008-12-14T00:00:00","perl_release":"5.008009","version":"2.07_02","dual_lived":1},{"dual_lived":1,"version":"2.08_01","perl_release":"5.011003","date":"2009-12-20T00:00:00"},{"version":"2.12_01","dual_lived":1,"perl_release":"5.024","date":"2016-05-09T00:00:00"}],"main_module":"File::Path"},"Perlbal":{"advisories":[{"severity":null,"affected_versions":["<1.70"],"references":["http://search.cpan.org/src/BRADFITZ/Perlbal-1.70/CHANGES","http://secunia.com/advisories/29565","http://www.vupen.com/english/advisories/2008/1045/references","https://exchange.xforce.ibmcloud.com/vulnerabilities/41540"],"id":"CPANSA-Perlbal-2008-1652","fixed_versions":[],"reported":"2008-04-02","cves":["CVE-2008-1652"],"description":"Directory traversal vulnerability in the _serve_request_multiple function in lib/Perlbal/ClientHTTPBase.pm in Perlbal before 1.70, when concat get is enabled, allows remote attackers to read arbitrary files in a parent directory via a directory traversal sequence in an unspecified parameter. NOTE: some of these details are obtained from third party information.\n","distribution":"Perlbal"}],"versions":[{"version":"1.3","date":"2005-07-26T20:21:09"},{"version":"1.35","date":"2005-08-17T06:04:13"},{"version":"1.36","date":"2005-08-19T17:27:29"},{"date":"2005-10-19T16:57:48","version":"1.38"},{"version":"1.41","date":"2006-02-06T19:25:44"},{"date":"2006-08-04T04:56:17","version":"1.42"},{"version":"1.43","date":"2006-08-09T18:09:23"},{"date":"2006-08-10T21:49:57","version":"1.44"},{"version":"1.45","date":"2006-08-10T23:04:14"},{"date":"2006-08-10T23:55:32","version":"1.46"},{"date":"2006-08-15T23:17:40","version":"1.47"},{"version":"1.50","date":"2006-09-08T20:42:55"},{"version":"1.51","date":"2006-10-04T18:55:28"},{"version":"1.52","date":"2006-11-13T18:01:56"},{"version":"1.53","date":"2006-12-05T09:32:56"},{"date":"2007-02-05T20:00:01","version":"1.54"},{"date":"2007-03-21T07:32:33","version":"1.55"},{"date":"2007-04-16T21:02:13","version":"1.56"},{"date":"2007-04-26T20:37:24","version":"1.57"},{"version":"1.58","date":"2007-05-11T18:20:57"},{"date":"2007-05-22T17:31:31","version":"1.59"},{"date":"2007-10-24T04:09:35","version":"1.60"},{"version":"1.70","date":"2008-03-09T04:28:27"},{"version":"1.71","date":"2008-09-14T00:41:35"},{"version":"1.72","date":"2008-09-22T01:40:20"},{"date":"2009-10-05T20:51:59","version":"1.73"},{"version":"1.74","date":"2010-03-20T07:59:03"},{"date":"2010-04-02T22:32:03","version":"1.75"},{"version":"1.76","date":"2010-06-18T01:52:54"},{"version":"1.77","date":"2011-01-16T05:20:16"},{"date":"2011-01-23T05:33:07","version":"1.78"},{"date":"2011-06-15T23:59:19","version":"1.79"},{"version":"1.80","date":"2012-02-27T07:02:28"}],"main_module":"Perlbal"},"Apache-Wyrd":{"advisories":[{"severity":null,"references":["https://metacpan.org/dist/Apache-Wyrd/changes"],"affected_versions":["<0.97"],"id":"CPANSA-Apache-Wyrd-2008-01","distribution":"Apache-Wyrd","description":"User-submitted data cab be executed if it is displayed on a page, if the data contains a string that can be interpreted as a Wyrd.\n","reported":"2008-04-14","cves":[],"fixed_versions":[">=0.97"]}],"versions":[{"date":"2004-03-17T21:36:52","version":"0.8"},{"date":"2004-03-18T22:52:04","version":"0.81"},{"date":"2004-03-25T23:52:49","version":"0.82"},{"version":"0.83","date":"2004-08-19T15:42:55"},{"date":"2004-09-03T19:44:01","version":"0.84"},{"version":"0.85","date":"2004-09-22T16:08:23"},{"date":"2004-09-23T02:04:43","version":"0.86"},{"version":"0.87","date":"2004-10-31T20:59:42"},{"version":"0.90","date":"2004-12-16T20:56:33"},{"version":"0.91","date":"2005-01-09T21:52:49"},{"version":"0.92","date":"2005-01-13T17:42:18"},{"version":"0.93","date":"2005-03-25T21:22:56"},{"date":"2006-10-22T22:57:04","version":"0.94"},{"version":"0.95","date":"2007-04-30T23:02:05"},{"date":"2007-05-01T15:20:02","version":"0.96"},{"version":"0.97","date":"2008-04-14T18:49:14"},{"date":"2008-04-15T21:32:47","version":"0.98"}],"main_module":"Apache::Wyrd"},"Net-Dropbox-API":{"advisories":[{"affected_versions":[">0"],"references":["https://metacpan.org/release/BAREFOOT/Data-Random-0.13/source/lib/Data/Random.pm#L537","https://metacpan.org/release/NORBU/Net-Dropbox-API-1.9/source/lib/Net/Dropbox/API.pm#L11","https://metacpan.org/release/NORBU/Net-Dropbox-API-1.9/source/lib/Net/Dropbox/API.pm#L385","https://perldoc.perl.org/functions/rand","https://security.metacpan.org/docs/guides/random-data-for-security.html"],"severity":null,"distribution":"Net-Dropbox-API","description":"Net::Dropbox::API 1.9 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Net::Dropbox::API uses the Data::Random library which specifically states that it is \"Useful mostly for test programs\". Data::Random uses the rand() function.","reported":"2025-04-05","cves":["CVE-2024-58036"],"fixed_versions":[],"id":"CPANSA-Net-Dropbox-API-2024-58036"}],"versions":[{"version":"0.02","date":"2010-05-12T02:24:44"},{"date":"2010-05-12T03:47:17","version":"0.3"},{"date":"2010-05-12T05:20:22","version":"0.4"},{"date":"2010-05-13T01:28:14","version":"0.5"},{"date":"2010-05-13T01:45:47","version":"0.6"},{"date":"2010-09-29T22:44:37","version":"0.7"},{"version":"0.9","date":"2010-10-17T21:34:59"},{"version":"0.10","date":"2011-02-06T21:28:22"},{"date":"2011-02-20T20:23:48","version":"1.0"},{"version":"1.1","date":"2011-02-23T03:51:46"},{"version":"1.2","date":"2011-03-23T19:59:39"},{"version":"1.3","date":"2011-04-08T04:53:20"},{"version":"1.4","date":"2011-04-12T19:45:12"},{"date":"2011-05-09T07:49:55","version":"1.5"},{"version":"1.6","date":"2011-05-16T05:45:53"},{"date":"2011-06-16T01:18:02","version":"1.6.1"},{"date":"2011-06-28T00:24:02","version":"1.7"},{"version":"1.8","date":"2012-03-22T23:54:58"},{"version":"1.9","date":"2012-10-23T07:31:36"}],"main_module":"Net::Dropbox::API"},"Catalyst-Runtime":{"advisories":[{"id":"CPANSA-Catalyst-Runtime-2013-01","distribution":"Catalyst-Runtime","description":"Passing a special host to the redirect page link makes it vulnerable to XSS attack.\n","reported":"2013-01-23","fixed_versions":[">=5.90020"],"cves":[],"references":["http://git.shadowcat.co.uk/gitweb/gitweb.cgi?p=catagits/Catalyst-Runtime.git;a=commitdiff;h=7af54927870a7c6f89323ac1876d49f92e7841f5"],"affected_versions":["<5.90020"]},{"distribution":"Catalyst-Runtime","description":"Path traversal in Static::Simple plugin.\n","reported":"2005-11-24","fixed_versions":[">=5.58"],"cves":[],"id":"CPANSA-Catalyst-Runtime-2005-01","affected_versions":["<5.58"]}],"versions":[{"version":"5.70_01","date":"2006-06-25T19:20:53"},{"version":"5.70_02","date":"2006-06-27T18:10:20"},{"date":"2006-06-28T21:50:30","version":"5.70_03"},{"date":"2006-07-07T22:47:30","version":"5.7000"},{"date":"2006-07-20T06:00:58","version":"5.7001"},{"date":"2006-09-19T07:36:29","version":"5.7002"},{"version":"5.7003","date":"2006-09-23T17:43:12"},{"version":"5.7004","date":"2006-11-06T23:28:40"},{"date":"2006-11-07T19:43:56","version":"5.7005"},{"date":"2006-11-15T08:27:59","version":"5.7006"},{"version":"5.7007","date":"2007-03-14T11:13:37"},{"version":"5.7008","date":"2007-08-13T06:36:11"},{"date":"2007-08-21T22:23:53","version":"5.7009"},{"date":"2007-08-22T05:51:41","version":"5.7010"},{"date":"2007-10-18T18:11:24","version":"5.7011"},{"date":"2007-12-17T08:19:28","version":"5.7012"},{"date":"2008-05-17T12:41:13","version":"5.7013"},{"version":"5.7013","date":"2008-05-25T21:16:45"},{"date":"2008-06-25T20:43:41","version":"5.7099_01"},{"version":"5.7099_02","date":"2008-07-18T11:41:25"},{"date":"2008-07-20T08:15:02","version":"5.7099_02"},{"version":"5.7099_02","date":"2008-10-13T20:55:41"},{"date":"2008-10-14T06:06:06","version":"5.7099_02"},{"version":"5.7015","date":"2008-10-15T21:44:15"},{"version":"5.8000_03","date":"2008-10-17T12:42:53"},{"version":"5.8000_04","date":"2008-12-05T15:11:14"},{"version":"5.7099_04","date":"2009-01-12T15:46:59"},{"version":"5.71000","date":"2009-01-19T17:36:04"},{"version":"5.8000_05","date":"2009-01-29T08:56:09"},{"version":"5.8000_06","date":"2009-02-04T20:08:22"},{"version":"5.71001","date":"2009-03-27T09:21:12"},{"version":"5.8000_07","date":"2009-04-13T19:03:36"},{"date":"2009-04-18T20:26:00","version":"5.80001"},{"version":"5.80002","date":"2009-04-21T23:45:45"},{"version":"5.80003","date":"2009-04-29T14:39:21"},{"version":"5.80004","date":"2009-05-18T15:16:38"},{"version":"5.80005","date":"2009-06-06T12:49:15"},{"date":"2009-06-29T22:11:48","version":"5.80006"},{"version":"5.80007","date":"2009-06-30T22:11:36"},{"date":"2009-08-21T16:14:33","version":"5.80008"},{"date":"2009-08-21T20:29:33","version":"5.80009"},{"date":"2009-08-21T21:42:08","version":"5.80010"},{"version":"5.80011","date":"2009-08-23T11:57:26"},{"version":"5.80012","date":"2009-09-09T18:01:32"},{"date":"2009-09-17T09:35:20","version":"5.80013"},{"version":"5.80014","date":"2009-11-21T02:32:20"},{"version":"5.80014_01","date":"2009-11-22T20:24:47"},{"version":"5.80014_02","date":"2009-12-01T01:14:00"},{"version":"5.80015","date":"2009-12-02T15:42:50"},{"version":"5.80016","date":"2009-12-11T23:37:44"},{"date":"2010-01-10T02:01:50","version":"5.80017"},{"date":"2010-01-12T21:39:47","version":"5.80018"},{"version":"5.80019","date":"2010-01-29T00:18:07"},{"version":"5.80020","date":"2010-02-04T06:19:31"},{"version":"5.80021","date":"2010-03-03T23:16:29"},{"version":"5.80022","date":"2010-03-28T19:25:48"},{"version":"5.80023","date":"2010-05-07T22:07:08"},{"date":"2010-05-15T09:57:52","version":"5.80024"},{"date":"2010-07-29T00:59:16","version":"5.80025"},{"version":"5.80026","date":"2010-09-01T15:10:42"},{"version":"5.80027","date":"2010-09-02T11:33:03"},{"date":"2010-09-28T20:14:11","version":"5.80028"},{"version":"5.80029","date":"2010-10-03T16:24:08"},{"date":"2011-01-04T12:56:30","version":"5.80030"},{"version":"5.89000","date":"2011-01-24T10:50:27"},{"version":"5.80031","date":"2011-01-31T08:25:21"},{"version":"5.80032","date":"2011-02-23T08:28:58"},{"date":"2011-03-01T14:56:37","version":"5.89001"},{"date":"2011-03-02T10:37:42","version":"5.89002"},{"date":"2011-07-24T15:58:37","version":"5.80033"},{"date":"2011-07-28T20:05:01","version":"5.89003"},{"date":"2011-08-15T21:35:34","version":"5.9000"},{"version":"5.90001","date":"2011-08-15T21:59:58"},{"date":"2011-08-22T20:55:10","version":"5.90002"},{"date":"2011-10-05T07:48:57","version":"5.90003"},{"date":"2011-10-11T15:19:05","version":"5.90004"},{"version":"5.90005","date":"2011-10-22T21:01:24"},{"date":"2011-10-25T17:54:34","version":"5.90006"},{"version":"5.90007","date":"2011-11-22T20:40:44"},{"version":"5.90008","date":"2012-02-06T21:08:28"},{"date":"2012-02-16T09:29:44","version":"5.90009"},{"date":"2012-02-18T00:49:30","version":"5.90010"},{"date":"2012-03-08T21:53:00","version":"5.90011"},{"version":"5.90012","date":"2012-05-19T07:13:21"},{"date":"2012-06-08T00:37:40","version":"5.90013"},{"version":"5.90013","date":"2012-06-21T20:41:41"},{"version":"5.90014","date":"2012-06-26T14:34:56"},{"version":"5.90015","date":"2012-06-30T18:00:53"},{"date":"2012-08-17T01:39:42","version":"5.90016"},{"version":"5.90017","date":"2012-10-19T21:51:54"},{"date":"2012-10-24T01:01:44","version":"5.90018"},{"version":"5.90019","date":"2012-12-04T22:04:19"},{"date":"2013-02-22T14:05:39","version":"5.90020"},{"date":"2013-04-12T17:09:27","version":"5.90030"},{"date":"2013-06-12T21:26:14","version":"5.90040"},{"version":"5.90041","date":"2013-06-15T02:10:17"},{"date":"2013-06-16T01:57:47","version":"5.90042"},{"version":"5.90049_001","date":"2013-07-26T19:13:01"},{"date":"2013-08-21T02:39:45","version":"5.90049_002"},{"version":"5.90049_003","date":"2013-09-20T19:03:54"},{"date":"2013-10-18T22:19:33","version":"5.90049_004"},{"version":"5.90049_005","date":"2013-10-31T20:48:42"},{"version":"5.90049_006","date":"2013-11-05T03:25:31"},{"version":"5.90050","date":"2013-11-05T22:35:22"},{"date":"2013-11-07T17:14:35","version":"5.90051"},{"version":"5.90052","date":"2013-12-18T20:03:22"},{"date":"2013-12-19T14:33:08","version":"5.90059_001"},{"version":"5.90053","date":"2013-12-22T16:18:16"},{"date":"2013-12-22T16:34:11","version":"5.90059_002"},{"date":"2013-12-27T02:27:08","version":"5.90059_003"},{"date":"2014-01-27T17:20:51","version":"5.90059_004"},{"version":"5.90059_005","date":"2014-01-28T19:36:58"},{"version":"5.90059_006","date":"2014-02-06T20:41:25"},{"version":"5.90060","date":"2014-02-08T03:11:11"},{"date":"2014-03-10T14:46:10","version":"5.90061"},{"version":"5.90062","date":"2014-04-14T18:53:26"},{"version":"5.90063","date":"2014-05-02T00:15:16"},{"version":"5.90064","date":"2014-05-05T14:55:25"},{"version":"5.90069_001","date":"2014-05-27T18:08:08"},{"date":"2014-06-05T12:44:59","version":"5.90065"},{"date":"2014-06-10T00:22:42","version":"5.90069_002"},{"date":"2014-08-06T15:09:29","version":"5.90069_003"},{"date":"2014-08-07T15:59:15","version":"5.90069_004"},{"version":"5.90070","date":"2014-08-07T21:49:59"},{"version":"5.90071","date":"2014-08-10T13:15:52"},{"date":"2014-09-15T16:30:58","version":"5.90072"},{"version":"5.90073","date":"2014-09-23T17:24:54"},{"version":"5.90074","date":"2014-10-01T21:45:12"},{"date":"2014-10-07T00:07:51","version":"5.90075"},{"version":"5.90076","date":"2014-11-14T00:20:16"},{"date":"2014-11-19T00:28:27","version":"5.90077"},{"version":"5.90079_001","date":"2014-12-02T21:50:30"},{"date":"2014-12-02T23:22:07","version":"5.90079_002"},{"version":"5.90079_003","date":"2014-12-03T19:45:16"},{"date":"2014-12-26T23:05:46","version":"5.90079_004"},{"date":"2014-12-31T16:26:20","version":"5.90078"},{"date":"2014-12-31T21:04:56","version":"5.90079_005"},{"version":"5.90079_006","date":"2015-01-02T15:11:55"},{"date":"2015-01-02T18:11:38","version":"5.90079"},{"version":"5.90079_007","date":"2015-01-07T20:01:40"},{"date":"2015-01-07T23:26:17","version":"5.90079_008"},{"version":"5.90080","date":"2015-01-09T17:04:47"},{"date":"2015-01-10T22:39:56","version":"5.90081"},{"version":"5.90082","date":"2015-01-10T23:33:56"},{"date":"2015-02-17T02:29:50","version":"5.90083"},{"version":"5.90084","date":"2015-02-23T22:24:50"},{"version":"5.90085","date":"2015-03-25T18:58:11"},{"date":"2015-03-26T21:30:15","version":"5.90089_001"},{"version":"5.90089_002","date":"2015-04-17T21:32:30"},{"date":"2015-04-27T20:20:40","version":"5.90089_003"},{"date":"2015-04-28T18:24:12","version":"5.90089_004"},{"date":"2015-04-29T14:04:24","version":"5.90090"},{"date":"2015-05-08T20:36:59","version":"5.90091"},{"version":"5.90092","date":"2015-05-19T16:48:30"},{"version":"5.90093","date":"2015-05-29T17:06:23"},{"version":"5.90094","date":"2015-07-24T20:17:46"},{"date":"2015-07-27T14:32:30","version":"5.90095"},{"date":"2015-07-27T15:44:59","version":"5.90096"},{"version":"5.90097","date":"2015-07-28T20:33:41"},{"date":"2015-08-24T16:30:12","version":"5.90100"},{"date":"2015-09-04T22:57:40","version":"5.90101"},{"version":"5.90102","date":"2015-10-29T19:39:24"},{"date":"2015-11-12T10:19:42","version":"5.90103"},{"version":"5.90104","date":"2016-04-04T17:18:38"},{"version":"5.90105","date":"2016-06-08T20:06:53"},{"version":"5.90106","date":"2016-07-06T01:21:42"},{"date":"2016-07-20T19:12:32","version":"5.90110"},{"date":"2016-07-20T20:07:16","version":"5.90111"},{"date":"2016-07-25T21:03:05","version":"5.90112"},{"date":"2016-12-15T21:35:30","version":"5.90113"},{"version":"5.90114","date":"2016-12-19T16:54:08"},{"date":"2017-05-01T16:42:46","version":"5.90115"},{"date":"2018-01-19T20:55:15","version":"5.90116"},{"date":"2018-01-21T23:47:21","version":"5.90117"},{"date":"2018-05-01T09:59:20","version":"5.90118"},{"date":"2018-09-24T00:25:48","version":"5.90119"},{"version":"5.90120","date":"2018-10-19T06:13:58"},{"date":"2018-10-22T20:39:48","version":"5.90_121"},{"version":"5.90122","date":"2018-11-03T14:52:06"},{"date":"2018-11-27T15:39:35","version":"5.90123"},{"date":"2019-01-18T22:36:07","version":"5.90124"},{"date":"2020-01-19T01:11:05","version":"5.90125"},{"date":"2020-01-20T01:40:16","version":"5.90126"},{"version":"5.90_127","date":"2020-07-27T01:25:21"},{"date":"2020-09-11T12:38:26","version":"5.90128"},{"version":"5.90129","date":"2022-07-23T13:13:34"},{"version":"5.90130","date":"2022-11-09T15:37:01"},{"date":"2023-07-20T23:09:29","version":"5.90131"},{"version":"5.90132","date":"2024-11-08T19:56:41"}],"main_module":"Catalyst::Runtime"},"DBD-MariaDB":{"versions":[{"date":"2018-06-26T14:23:29","version":"0.90_01"},{"version":"1.00","date":"2018-07-12T13:36:05"},{"version":"1.10","date":"2018-12-05T12:21:26"},{"version":"1.11","date":"2019-01-02T15:38:57"},{"version":"1.20","date":"2019-02-22T16:31:33"},{"version":"1.21","date":"2019-02-27T11:08:40"},{"date":"2022-04-21T23:16:33","version":"1.22"},{"version":"1.23","date":"2023-09-10T14:27:09"},{"date":"2025-05-04T19:33:22","version":"1.24"}],"main_module":"DBD::MariaDB","advisories":[{"reported":"2017-07-01","cves":["CVE-2018-2767"],"fixed_versions":[">=1.00"],"description":"SSL problems of MySQL and MariaDB clients.\n","distribution":"DBD-MariaDB","id":"CPANSA-DBD-MariaDB-2018-01","affected_versions":["<1.00"],"references":["https://metacpan.org/changes/distribution/DBD-MariaDB"]},{"id":"CPANSA-DBD-MariaDB-2017-02","cves":["CVE-2017-10788"],"reported":"2017-07-01","fixed_versions":[">=1.00"],"distribution":"DBD-MariaDB","description":"Use-after-free after calling mysql_stmt_close().\n","affected_versions":["<1.00"],"references":["https://metacpan.org/changes/distribution/DBD-MariaDB"]},{"id":"CPANSA-DBD-MariaDB-2017-01","distribution":"DBD-MariaDB","description":"Leaking dangling pointers.\n","reported":"2017-07-01","cves":["CVE-2017-3302"],"fixed_versions":[">=1.00"],"affected_versions":["<1.00"],"references":["https://metacpan.org/changes/distribution/DBD-MariaDB"]}]},"Win32-File-Summary":{"advisories":[{"id":"CPANSA-Win32-File-Summary-2018-01","description":"In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.\n","distribution":"Win32-File-Summary","cves":["CVE-2018-12015"],"reported":"2018-06-12","fixed_versions":[],"references":["https://security-tracker.debian.org/tracker/CVE-2018-12015","https://github.com/jib/archive-tar-new/commit/ae65651eab053fc6dc4590dbb863a268215c1fc5"],"affected_versions":[">0"],"severity":"medium","embedded_vulnerability":{"distributed_version":"0.072","name":"Archive::Tar"}},{"embedded_vulnerability":{"name":"Archive::Tar","distributed_version":"0.072"},"severity":null,"distribution":"Win32-File-Summary","description":"Directory traversal vulnerability in the Archive::Tar Perl module 1.36 and earlier allows user-assisted remote attackers to overwrite arbitrary files via a TAR archive that contains a file whose name is an absolute path or has \"..\" sequences.\n","reported":"2007-11-02","fixed_versions":[],"cves":["CVE-2007-4829"],"id":"CPANSA-Win32-File-Summary-2007-4829","references":["http://rt.cpan.org/Public/Bug/Display.html?id=29517","https://bugzilla.redhat.com/show_bug.cgi?id=295021","http://rt.cpan.org/Public/Bug/Display.html?id=30380","https://issues.rpath.com/browse/RPL-1716","http://www.securityfocus.com/bid/26355","http://secunia.com/advisories/27539","http://osvdb.org/40410","http://www.ubuntu.com/usn/usn-700-1","http://secunia.com/advisories/33314","http://www.ubuntu.com/usn/usn-700-2","http://www.gentoo.org/security/en/glsa/glsa-200812-10.xml","http://secunia.com/advisories/33116","http://www.vupen.com/english/advisories/2007/3755","https://exchange.xforce.ibmcloud.com/vulnerabilities/38285","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11658"],"affected_versions":[">0"]},{"embedded_vulnerability":{"distributed_version":"0.072","name":"Archive::Tar"},"severity":"high","references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"affected_versions":[">0"],"fixed_versions":[],"reported":"2016-08-02","cves":["CVE-2016-1238"],"description":"'(1) cpan/Win32-File-Summary/bin/ptar, (2) cpan/Win32-File-Summary/bin/ptardiff, (3) cpan/Win32-File-Summary/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.'\n","distribution":"Win32-File-Summary","id":"CPANSA-Win32-File-Summary-2016-1238"}],"main_module":"Win32::File::Summary","versions":[{"date":"2005-04-24T18:36:18","version":"0.01"},{"version":"0.01","date":"2005-04-25T15:18:03"},{"date":"2005-04-30T12:09:11","version":"0.01"},{"date":"2005-05-17T09:52:46","version":"0.01"},{"version":"0.01","date":"2005-08-06T18:10:08"},{"date":"2005-08-24T04:39:30","version":"0.01"},{"date":"2006-06-11T14:15:36","version":"0.01"}]},"HTML-EP":{"versions":[{"version":"0.1000","date":"1998-06-24T20:39:44"},{"version":"0.1002","date":"1998-06-26T12:21:47"},{"version":"0.1005","date":"1998-07-17T21:28:11"},{"date":"1998-07-18T16:05:32","version":"0.1006"},{"date":"1998-07-24T20:40:11","version":"0.1100"},{"version":"0.1106","date":"1998-09-12T20:26:57"},{"version":"0.1107","date":"1998-09-14T00:09:23"},{"date":"1998-09-18T01:41:54","version":"0.1108"},{"date":"1998-10-06T09:42:57","version":"0.1109"},{"version":"0.1111","date":"1998-10-13T16:57:33"},{"version":"0.1112","date":"1998-10-15T19:02:15"},{"date":"1998-10-21T21:58:15","version":"0.1113"},{"version":"0.1116","date":"1998-11-06T20:01:59"},{"version":"0.1117","date":"1998-11-29T18:25:07"},{"version":"0.1118","date":"1998-12-03T17:11:04"},{"date":"1999-01-26T02:07:08","version":"0.1123"},{"date":"1999-02-01T00:08:19","version":"0.1124"},{"date":"1999-02-07T20:07:50","version":"0.1125"},{"version":"0.1126","date":"1999-02-13T12:36:36"},{"date":"1999-02-23T18:47:31","version":"0.1127"},{"version":"0.1128","date":"1999-02-26T18:27:47"},{"version":"0.1130","date":"1999-05-04T22:59:11"},{"date":"1999-08-26T15:05:04","version":"0.11321"},{"version":"0.1133","date":"1999-08-27T11:29:51"},{"version":"0.1134","date":"1999-08-31T11:04:44"},{"date":"1999-09-21T10:22:21","version":"0.1135"},{"date":"1999-09-26T13:27:28","version":"0.20_00"},{"date":"1999-09-27T10:28:51","version":"0.20_01"},{"date":"1999-11-05T11:38:40","version":"0.2003"},{"version":"0.2004","date":"1999-11-08T15:38:12"},{"date":"1999-11-08T18:18:11","version":"0.2005"},{"date":"1999-11-17T12:28:55","version":"0.2006"},{"date":"1999-11-17T17:23:52","version":"0.2007"},{"date":"1999-11-25T10:15:38","version":"0.2008"},{"version":"0.2009","date":"1999-12-07T20:43:46"},{"version":"0.2010","date":"1999-12-15T22:41:39"},{"date":"2001-01-05T13:26:37","version":"0.2011"},{"version":0,"date":"2001-01-05T13:27:07"}],"main_module":"HTML::EP","advisories":[{"references":["http://www.securityfocus.com/bid/59833","http://seclists.org/oss-sec/2013/q2/318","https://exchange.xforce.ibmcloud.com/vulnerabilities/84199"],"affected_versions":[">=0.2011"],"severity":null,"distribution":"HTML-EP","description":"HTML::EP::Session::Cookie in the HTML::EP module 0.2011 for Perl does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via a crafted request, which is not properly handled when it is deserialized.\n","cves":["CVE-2012-6142"],"reported":"2014-06-04","fixed_versions":[],"id":"CPANSA-HTML-EP-2012-6142"}]},"App-Genpass":{"advisories":[{"affected_versions":["<0.2400"],"references":["https://metacpan.org/dist/App-Genpass/changes","https://github.com/xsawyerx/app-genpass/pull/5","https://github.com/briandfoy/cpan-security-advisory/issues/178"],"severity":null,"reported":null,"fixed_versions":[">=0.2400"],"cves":[],"distribution":"App-Genpass","description":"App-genpass before v0.2400 generated passwords using build in rand()\n","id":"CPANSA-App-Genpass-2024-001"}],"versions":[{"date":"2009-12-14T22:15:31","version":"0.03"},{"version":"0.04","date":"2010-01-01T18:06:50"},{"date":"2010-01-02T07:45:49","version":"0.05"},{"version":"0.06","date":"2010-05-28T21:46:01"},{"date":"2010-05-29T21:37:11","version":"0.07"},{"date":"2010-05-30T08:35:54","version":"0.08"},{"version":"0.09","date":"2010-05-31T18:39:55"},{"version":"0.10","date":"2010-06-07T10:16:54"},{"version":"0.11","date":"2010-07-16T21:15:53"},{"version":"1.00","date":"2010-07-16T22:36:16"},{"version":"1.01","date":"2010-07-18T15:20:18"},{"version":"2.00","date":"2011-02-17T10:52:08"},{"date":"2011-03-10T12:26:49","version":"2.01"},{"date":"2011-08-03T11:58:46","version":"2.02"},{"date":"2011-08-03T16:05:37","version":"2.03"},{"date":"2011-08-06T07:36:59","version":"2.04"},{"date":"2011-08-08T12:51:57","version":"2.10"},{"date":"2011-11-27T17:45:15","version":"2.20"},{"date":"2012-03-26T19:55:19","version":"2.30"},{"version":"2.31","date":"2012-06-26T08:16:36"},{"date":"2012-06-30T23:12:23","version":"2.32"},{"version":"2.33","date":"2012-11-20T08:48:46"},{"date":"2014-08-04T20:00:26","version":"2.34"},{"date":"2016-10-12T08:56:56","version":"2.400"},{"version":"2.401","date":"2016-10-14T21:27:13"}],"main_module":"App::Genpass"},"Elive":{"advisories":[{"severity":null,"references":["https://metacpan.org/dist/Elive/changes"],"affected_versions":["<1.20"],"id":"CPANSA-Elive-2011-01","description":"Elive::DAO->set() did not die on tainted data.\n","distribution":"Elive","cves":[],"reported":"2011-10-15","fixed_versions":[">=1.20"]}],"main_module":"Elive","versions":[{"date":"2009-03-17T06:37:43","version":"0.01"},{"date":"2009-04-13T23:51:59","version":"0.02"},{"date":"2009-04-14T20:26:27","version":"0.03"},{"version":"0.04","date":"2009-04-15T22:30:08"},{"version":"0.05","date":"2009-04-17T07:27:23"},{"date":"2009-04-17T22:04:55","version":"0.06"},{"version":"0.07","date":"2009-04-22T00:14:13"},{"version":"0.08","date":"2009-04-22T03:10:13"},{"version":"0.09","date":"2009-04-24T22:26:35"},{"date":"2009-04-28T07:30:45","version":"0.10"},{"version":"0.11","date":"2009-04-29T21:49:12"},{"version":"0.12","date":"2009-05-01T23:15:47"},{"date":"2009-05-04T22:19:09","version":"0.13"},{"date":"2009-05-05T20:09:18","version":"0.14"},{"date":"2009-05-08T22:04:14","version":"0.15"},{"date":"2009-05-11T20:38:56","version":"0.16"},{"version":"0.17","date":"2009-05-13T21:31:52"},{"version":"0.18","date":"2009-05-15T03:47:36"},{"date":"2009-05-18T21:43:03","version":"0.19"},{"version":"0.20","date":"2009-05-24T00:13:36"},{"version":"0.21","date":"2009-05-24T20:48:19"},{"date":"2009-05-27T22:05:37","version":"0.22"},{"version":"0.23","date":"2009-05-29T05:09:57"},{"date":"2009-06-03T04:48:43","version":"0.24"},{"date":"2009-06-03T22:18:02","version":"0.25"},{"version":"0.26","date":"2009-06-12T22:36:31"},{"version":"0.27","date":"2009-06-19T21:34:40"},{"version":"0.28","date":"2009-06-22T03:47:43"},{"date":"2009-06-24T04:14:37","version":"0.29"},{"date":"2009-06-26T23:24:47","version":"0.30"},{"version":"0.31","date":"2009-07-03T06:18:23"},{"date":"2009-07-17T22:56:55","version":"0.32"},{"version":"0.33","date":"2009-07-22T03:22:18"},{"version":"0.34","date":"2009-07-28T06:46:45"},{"version":"0.35","date":"2009-08-02T22:36:31"},{"version":"0.36","date":"2009-08-03T22:44:25"},{"date":"2009-08-05T21:02:32","version":"0.37"},{"date":"2009-08-21T08:29:37","version":"0.38"},{"date":"2009-08-31T02:24:45","version":"0.39"},{"date":"2009-09-10T01:20:54","version":"0.40"},{"date":"2009-09-11T21:34:13","version":"0.41"},{"version":"0.42","date":"2009-10-08T00:53:22"},{"date":"2009-10-20T23:09:46","version":"0.43"},{"version":"0.44","date":"2009-10-22T00:05:22"},{"date":"2009-10-26T04:15:36","version":"0.45"},{"version":"0.46","date":"2009-10-28T08:27:27"},{"date":"2009-10-28T21:26:06","version":"0.47"},{"version":"0.48","date":"2009-10-29T00:00:43"},{"date":"2009-11-02T21:37:24","version":"0.48_01"},{"date":"2009-11-06T20:36:30","version":"0.49"},{"version":"0.50","date":"2009-11-09T21:34:02"},{"date":"2009-11-16T00:26:26","version":"0.51"},{"date":"2009-11-30T20:38:39","version":"0.52"},{"version":"0.53","date":"2009-12-14T23:14:43"},{"version":"0.53_1","date":"2009-12-18T00:24:06"},{"version":"0.54","date":"2009-12-18T22:36:34"},{"date":"2009-12-20T20:02:22","version":"0.55"},{"version":"0.56","date":"2010-01-04T06:35:00"},{"date":"2010-01-04T21:18:52","version":"0.57"},{"date":"2010-01-14T00:08:40","version":"0.58"},{"date":"2010-01-21T22:46:27","version":"0.59"},{"date":"2010-01-24T21:24:09","version":"0.60"},{"date":"2010-01-26T22:38:54","version":"0.61"},{"date":"2010-02-15T23:06:41","version":"0.62"},{"version":"0.63","date":"2010-03-06T22:34:53"},{"version":"0.64","date":"2010-03-11T22:45:28"},{"date":"2010-05-17T00:40:50","version":"0.65"},{"date":"2010-05-21T23:54:39","version":"0.66"},{"date":"2010-05-27T22:12:29","version":"0.67"},{"version":"0.68","date":"2010-06-02T07:33:50"},{"date":"2010-06-11T00:12:21","version":"0.69"},{"date":"2010-06-22T05:13:22","version":"0.70"},{"version":"0.71","date":"2010-06-22T22:20:27"},{"date":"2010-08-13T01:10:30","version":"0.72"},{"date":"2010-09-03T03:48:51","version":"0.73"},{"version":"0.74_2","date":"2010-10-14T20:54:08"},{"date":"2010-10-18T01:49:41","version":"0.74"},{"version":"0.75","date":"2010-10-27T23:52:59"},{"version":"0.76","date":"2010-11-09T23:46:08"},{"date":"2010-12-08T21:27:13","version":"0.77"},{"version":"0.78","date":"2010-12-08T23:17:00"},{"date":"2011-01-20T02:01:43","version":"0.79"},{"date":"2011-01-27T19:56:34","version":"0.80"},{"version":"0.81","date":"2011-02-03T03:17:09"},{"date":"2011-02-10T00:02:08","version":"0.82"},{"version":"0.83","date":"2011-03-10T05:19:08"},{"date":"2011-03-11T01:11:39","version":"0.84"},{"date":"2011-03-14T00:55:18","version":"0.85"},{"version":"0.86","date":"2011-03-14T21:15:08"},{"date":"2011-04-11T00:59:22","version":"0.87"},{"version":"0.87.1","date":"2011-04-11T19:19:42"},{"date":"2011-04-15T02:12:50","version":"0.87.2"},{"version":"0.88","date":"2011-04-27T02:43:51"},{"date":"2011-05-20T00:15:55","version":"0.89"},{"date":"2011-06-08T23:34:06","version":"0.90"},{"version":"0.91","date":"2011-06-14T23:35:27"},{"version":"0.95","date":"2011-06-28T07:09:46"},{"date":"2011-06-29T21:42:38","version":"0.96"},{"date":"2011-07-05T06:35:18","version":"0.97"},{"version":"0.98","date":"2011-07-08T00:35:18"},{"version":"0.99","date":"2011-07-14T03:25:12"},{"version":"1.00","date":"2011-07-19T00:14:00"},{"date":"2011-07-20T01:14:39","version":"1.01"},{"date":"2011-07-21T05:49:47","version":"1.02"},{"version":"1.03","date":"2011-07-23T23:23:35"},{"date":"2011-07-29T00:14:06","version":"1.04"},{"date":"2011-08-01T02:20:53","version":"1.05"},{"version":"1.06","date":"2011-08-05T21:36:24"},{"version":"1.07","date":"2011-08-07T01:43:31"},{"date":"2011-08-09T00:51:44","version":"1.08"},{"date":"2011-08-10T05:13:13","version":"1.09"},{"version":"1.10","date":"2011-08-10T21:06:42"},{"version":"1.11","date":"2011-08-11T22:27:24"},{"version":"1.12","date":"2011-08-15T00:58:40"},{"version":"1.13","date":"2011-08-19T00:21:11"},{"version":"1.14","date":"2011-08-20T22:44:01"},{"version":"1.15","date":"2011-08-23T21:43:48"},{"version":"1.16","date":"2011-08-26T22:25:28"},{"date":"2011-09-08T22:32:49","version":"1.17"},{"version":"1.18","date":"2011-09-16T00:00:34"},{"date":"2011-09-28T07:09:24","version":"1.19"},{"date":"2011-11-15T01:28:33","version":"1.20"},{"version":"1.21","date":"2011-12-03T01:49:03"},{"version":"1.22","date":"2012-01-05T04:04:10"},{"version":"1.23","date":"2012-01-25T20:01:01"},{"version":"1.24","date":"2012-02-28T01:03:16"},{"date":"2012-04-18T04:53:06","version":"1.25"},{"version":"1.26","date":"2012-05-04T04:11:34"},{"version":"1.27","date":"2012-07-13T21:59:27"},{"version":"1.28","date":"2012-10-12T02:45:37"},{"date":"2012-10-26T21:16:49","version":"1.29"},{"date":"2013-01-04T01:33:50","version":"1.30"},{"version":"1.31","date":"2013-03-28T02:39:54"},{"date":"2014-02-28T16:40:50","version":"1.32"},{"date":"2015-01-21T21:14:50","version":"1.33"},{"date":"2015-04-03T22:38:32","version":"1.34"},{"date":"2015-06-29T02:59:33","version":"1.35"},{"version":"1.36","date":"2015-12-03T20:48:05"},{"date":"2015-12-04T02:58:35","version":"1.37"}]},"Compress-LZ4":{"advisories":[{"distribution":"Compress-LZ4","description":"Outdated LZ4 source code with security issue on 32bit systems.\n","reported":"2014-07-07","fixed_versions":[">=0.20"],"cves":[],"id":"CPANSA-Compress-LZ4-2014-01","references":["https://metacpan.org/changes/distribution/Compress-LZ4","https://github.com/gray/compress-lz4/commit/fc503812b4cbba16429658e1dfe20ad8bbfd77a0"],"affected_versions":["<0.20"]}],"main_module":"Compress::LZ4","versions":[{"version":"0.01","date":"2012-02-11T16:33:26"},{"date":"2012-02-20T21:26:48","version":"0.02"},{"version":"0.03","date":"2012-03-02T04:47:50"},{"date":"2012-03-18T07:09:30","version":"0.04"},{"version":"0.05","date":"2012-03-18T19:45:25"},{"version":"0.06","date":"2012-03-22T09:23:45"},{"version":"0.07","date":"2012-03-22T16:12:43"},{"version":"0.08","date":"2012-03-23T16:29:14"},{"version":"0.09","date":"2012-03-23T17:27:12"},{"date":"2012-03-26T11:28:24","version":"0.10"},{"version":"0.11","date":"2012-04-03T21:36:24"},{"version":"0.12","date":"2012-04-04T12:55:22"},{"date":"2012-06-01T18:55:41","version":"0.13"},{"version":"0.14","date":"2012-08-10T00:21:56"},{"date":"2012-08-11T16:37:53","version":"0.15"},{"version":"0.16","date":"2012-09-08T18:18:41"},{"version":"0.17","date":"2013-03-19T00:39:07"},{"date":"2013-11-19T00:56:57","version":"0.18"},{"date":"2014-02-08T00:35:09","version":"0.19"},{"version":"0.20","date":"2014-07-07T21:08:49"},{"version":"0.21","date":"2015-05-12T19:01:36"},{"date":"2015-05-20T06:16:53","version":"0.22"},{"version":"0.23","date":"2016-07-25T20:45:05"},{"date":"2017-03-23T04:34:45","version":"0.24"},{"version":"0.25","date":"2017-04-06T16:38:31"}]},"DBIx-Custom":{"advisories":[{"references":["https://metacpan.org/changes/distribution/DBIx-Custom","https://github.com/yuki-kimoto/DBIx-Custom/commit/5b00b9f9a966e7abecabd91710c8fa893784d919"],"affected_versions":["<0.1641"],"severity":"high","fixed_versions":[">=0.1641"],"reported":"2011-01-27","cves":[],"distribution":"DBIx-Custom","description":"SQL injection when passing special column names.\n","id":"CPANSA-DBIx-Custom-2011-01"}],"main_module":"DBIx::Custom","versions":[{"version":"0.0101","date":"2009-11-08T04:18:19"},{"date":"2009-11-09T10:46:44","version":"0.0201"},{"version":"0.0301","date":"2009-11-12T14:12:47"},{"date":"2009-11-15T11:43:40","version":"0.0401"},{"date":"2009-11-16T11:10:52","version":"0.0501"},{"version":"0.0502","date":"2009-11-17T12:37:33"},{"version":"0.0601","date":"2009-11-19T12:05:50"},{"date":"2009-11-19T13:37:39","version":"0.0602"},{"date":"2009-11-20T12:08:31","version":"0.0603"},{"date":"2009-11-23T13:39:53","version":"0.0604"},{"date":"2009-11-23T14:45:46","version":"0.0605"},{"date":"2009-11-25T13:57:52","version":"0.0701"},{"version":"0.0702","date":"2009-12-01T07:30:25"},{"date":"2009-12-02T13:59:36","version":"0.0801"},{"version":"0.0901","date":"2009-12-09T14:27:53"},{"date":"2009-12-22T13:40:07","version":"0.0902"},{"version":"0.0903","date":"2010-01-18T12:42:57"},{"date":"2010-01-21T14:29:12","version":"0.0904"},{"date":"2010-01-22T12:51:23","version":"0.0905"},{"version":"0.0906","date":"2010-01-24T09:49:30"},{"date":"2010-01-30T00:15:17","version":"0.1001"},{"date":"2010-01-30T03:51:04","version":"0.1101"},{"version":"0.1301","date":"2010-05-01T13:02:19"},{"date":"2010-05-01T23:29:22","version":"0.1401"},{"date":"2010-05-02T06:04:57","version":"0.1402"},{"date":"2010-05-26T15:13:04","version":"0.1501"},{"date":"2010-05-27T14:00:04","version":"0.1502"},{"version":"0.1503","date":"2010-05-28T13:28:16"},{"version":"0.1602","date":"2010-06-25T12:11:33"},{"date":"2010-07-14T13:55:33","version":"0.1603"},{"date":"2010-08-03T14:43:14","version":"0.1604"},{"version":"0.1605","date":"2010-08-05T15:17:49"},{"date":"2010-08-05T15:24:36","version":"0.1606"},{"version":"0.1607","date":"2010-08-06T14:57:35"},{"date":"2010-08-07T05:49:19","version":"0.1608"},{"date":"2010-08-08T04:45:12","version":"0.1609"},{"version":"0.1610","date":"2010-08-08T12:44:43"},{"date":"2010-08-09T12:08:31","version":"0.1611"},{"date":"2010-08-10T11:19:41","version":"0.1612"},{"version":"0.1613","date":"2010-08-10T12:35:17"},{"date":"2010-08-12T15:01:01","version":"0.1614"},{"version":"0.1615","date":"2010-08-15T04:00:44"},{"date":"2010-08-24T10:18:06","version":"0.1616"},{"version":"0.1617","date":"2010-09-07T12:12:04"},{"date":"2010-10-17T05:44:56","version":"0.1618"},{"date":"2010-10-20T15:01:35","version":"0.1619"},{"version":"0.1620","date":"2010-10-21T14:38:05"},{"date":"2010-11-10T06:54:46","version":"0.1621"},{"version":"0.1622","date":"2010-12-20T14:58:38"},{"date":"2010-12-21T16:10:25","version":"0.1623"},{"version":"0.1624","date":"2010-12-22T08:41:09"},{"version":"0.1625","date":"2011-01-01T16:08:48"},{"date":"2011-01-02T04:21:11","version":"0.1626"},{"version":"0.1627","date":"2011-01-04T15:18:21"},{"date":"2011-01-12T07:29:29","version":"0.1628"},{"date":"2011-01-12T15:35:11","version":"0.1629"},{"version":"0.1630","date":"2011-01-13T15:41:25"},{"version":"0.1631","date":"2011-01-17T15:53:44"},{"version":"0.1632","date":"2011-01-18T14:43:16"},{"version":"0.1633","date":"2011-01-18T15:22:37"},{"date":"2011-01-19T14:52:48","version":"0.1634"},{"version":"0.1635","date":"2011-01-21T14:04:02"},{"date":"2011-01-22T13:02:55","version":"0.1636"},{"date":"2011-01-24T12:58:40","version":"0.1637"},{"date":"2011-01-25T12:32:26","version":"0.1638"},{"version":"0.1639","date":"2011-01-26T09:23:22"},{"date":"2011-01-26T13:59:10","version":"0.1640"},{"date":"2011-01-27T05:19:14","version":"0.1641"},{"date":"2011-01-28T12:18:42","version":"0.1642"},{"version":"0.1643","date":"2011-02-09T08:54:11"},{"version":"0.1644","date":"2011-02-11T14:07:25"},{"version":"0.1645","date":"2011-02-14T15:24:30"},{"date":"2011-02-18T17:48:52","version":"0.1646"},{"date":"2011-02-19T00:30:41","version":"0.1647"},{"date":"2011-02-21T16:13:29","version":"0.1648"},{"version":"0.1649","date":"2011-02-22T14:53:08"},{"version":"0.1650","date":"2011-02-24T05:45:44"},{"version":"0.1651","date":"2011-02-24T14:35:20"},{"date":"2011-02-25T14:39:56","version":"0.1652"},{"date":"2011-02-28T13:18:03","version":"0.1653"},{"date":"2011-03-06T14:32:11","version":"0.1654"},{"date":"2011-03-08T14:59:08","version":"0.1655"},{"date":"2011-03-09T13:44:35","version":"0.1656"},{"date":"2011-03-10T15:44:50","version":"0.1657"},{"date":"2011-03-11T16:23:11","version":"0.1658"},{"version":"0.1659","date":"2011-03-12T08:20:07"},{"date":"2011-03-14T11:16:27","version":"0.1660"},{"version":"0.1661","date":"2011-03-15T16:32:52"},{"date":"2011-03-19T14:40:50","version":"0.1662"},{"date":"2011-03-21T03:53:25","version":"0.1663"},{"date":"2011-03-24T14:45:52","version":"0.1664"},{"version":"0.1665","date":"2011-03-25T14:25:43"},{"version":"0.1666","date":"2011-03-29T17:26:27"},{"version":"0.1667","date":"2011-03-30T08:03:39"},{"date":"2011-03-30T15:04:03","version":"0.1668"},{"version":"0.1669","date":"2011-03-30T15:25:45"},{"version":"0.1670","date":"2011-04-01T15:29:33"},{"date":"2011-04-02T16:31:44","version":"0.1671"},{"date":"2011-04-04T13:37:34","version":"0.1672"},{"date":"2011-04-05T11:45:54","version":"0.1673"},{"version":"0.1674","date":"2011-04-05T11:59:11"},{"date":"2011-04-11T13:47:34","version":"0.1675"},{"date":"2011-04-11T14:55:38","version":"0.1676"},{"date":"2011-04-12T15:17:24","version":"0.1677"},{"date":"2011-04-18T13:36:31","version":"0.1678"},{"version":"0.1679","date":"2011-04-19T11:07:27"},{"date":"2011-04-25T14:05:23","version":"0.1680"},{"date":"2011-04-26T14:07:02","version":"0.1681"},{"version":"0.1682","date":"2011-05-23T14:40:41"},{"version":"0.1683","date":"2011-06-06T11:52:44"},{"version":"0.1684","date":"2011-06-07T13:07:20"},{"date":"2011-06-08T10:32:35","version":"0.1685"},{"version":"0.1686","date":"2011-06-08T12:24:07"},{"date":"2011-06-09T13:59:44","version":"0.1687"},{"version":"0.1688","date":"2011-06-10T13:26:20"},{"date":"2011-06-12T03:22:26","version":"0.1689"},{"date":"2011-06-12T12:01:43","version":"0.1690"},{"date":"2011-06-13T13:31:21","version":"0.1691"},{"date":"2011-06-14T13:27:31","version":"0.1692"},{"date":"2011-06-15T08:51:43","version":"0.1693"},{"version":"0.1694","date":"2011-06-17T14:38:23"},{"date":"2011-06-20T13:08:47","version":"0.1695"},{"version":"0.1696","date":"2011-06-21T13:12:38"},{"version":"0.1697","date":"2011-06-24T13:42:00"},{"version":"0.1698","date":"2011-06-27T13:23:13"},{"version":"0.1699","date":"2011-06-28T14:39:21"},{"date":"2011-07-01T11:04:37","version":"0.1700"},{"version":"0.1701","date":"2011-07-11T13:19:20"},{"version":"0.1702","date":"2011-07-26T14:09:43"},{"date":"2011-07-28T04:59:20","version":"0.1703"},{"date":"2011-07-29T13:45:24","version":"0.1704"},{"version":"0.1705","date":"2011-07-29T14:35:38"},{"date":"2011-07-30T04:25:21","version":"0.1706"},{"version":"0.1707","date":"2011-07-30T05:16:05"},{"version":"0.1708","date":"2011-07-30T14:32:34"},{"version":"0.1709","date":"2011-08-01T12:48:52"},{"date":"2011-08-02T13:30:15","version":"0.1710"},{"date":"2011-08-09T14:11:24","version":"0.1711"},{"date":"2011-08-10T16:16:52","version":"0.1712"},{"date":"2011-08-12T13:45:58","version":"0.1713"},{"date":"2011-08-13T13:38:02","version":"0.1714"},{"version":"0.1715","date":"2011-08-14T03:47:28"},{"date":"2011-08-15T14:00:28","version":"0.1716"},{"version":"0.1717","date":"2011-08-16T04:03:16"},{"date":"2011-08-20T09:40:46","version":"0.1718"},{"version":"0.1720","date":"2011-08-22T13:43:21"},{"version":"0.1721","date":"2011-08-26T14:11:53"},{"date":"2011-09-02T15:12:10","version":"0.1722"},{"version":"0.1723","date":"2011-09-12T12:24:14"},{"version":"0.1724","date":"2011-09-16T15:15:54"},{"version":"0.1725","date":"2011-09-27T11:48:33"},{"date":"2011-09-30T11:21:45","version":"0.1726"},{"version":"0.1727","date":"2011-10-03T10:43:32"},{"date":"2011-10-05T04:10:35","version":"0.1728"},{"date":"2011-10-05T08:12:55","version":"0.1729"},{"date":"2011-10-10T11:35:23","version":"0.1730"},{"date":"2011-10-11T14:30:46","version":"0.1731"},{"version":"0.1732","date":"2011-10-20T11:56:08"},{"version":"0.1733","date":"2011-10-21T22:47:50"},{"date":"2011-10-22T22:02:37","version":"0.1734"},{"date":"2011-10-23T00:11:48","version":"0.1735"},{"date":"2011-10-23T13:08:15","version":"0.1736"},{"date":"2011-10-24T14:07:44","version":"0.1737"},{"date":"2011-10-25T14:31:15","version":"0.1738"},{"date":"2011-10-26T01:14:58","version":"0.1739"},{"date":"2011-10-27T12:59:00","version":"0.1740"},{"date":"2011-10-28T11:49:57","version":"0.1741"},{"date":"2011-10-31T15:37:07","version":"0.1742"},{"version":"0.1743","date":"2011-11-01T12:02:38"},{"date":"2011-11-03T13:38:04","version":"0.1744"},{"date":"2011-11-04T14:16:11","version":"0.1745"},{"date":"2011-11-07T12:19:53","version":"0.1746"},{"version":"0.1747","date":"2011-11-11T11:59:27"},{"version":"0.20_01","date":"2011-11-16T00:36:45"},{"version":"0.2100","date":"2011-11-16T08:50:11"},{"version":"0.2101","date":"2011-11-21T11:05:36"},{"version":"0.2102","date":"2011-11-25T14:34:26"},{"version":"0.2103","date":"2011-11-28T10:38:56"},{"date":"2011-11-29T13:48:49","version":"0.2104"},{"version":"0.2105","date":"2012-01-14T13:39:10"},{"version":"0.2106","date":"2012-01-20T15:16:34"},{"date":"2012-01-25T08:56:44","version":"0.2107"},{"version":"0.2108","date":"2012-01-29T14:30:53"},{"version":"0.2109","date":"2012-02-07T13:31:49"},{"date":"2012-02-10T14:51:17","version":"0.2110"},{"version":"0.2111","date":"2012-02-11T14:45:41"},{"version":"0.22","date":"2012-02-28T14:33:03"},{"version":"0.23","date":"2012-03-01T00:07:11"},{"date":"2012-03-02T14:57:03","version":"0.24"},{"date":"2012-03-19T11:58:43","version":"0.25"},{"version":"0.26","date":"2012-07-11T08:20:53"},{"date":"2012-09-17T13:15:26","version":"0.27"},{"date":"2013-03-04T11:25:17","version":"0.28"},{"version":"0.29","date":"2014-02-03T09:21:29"},{"date":"2014-02-04T00:17:32","version":"0.30"},{"version":"0.31","date":"2015-01-13T01:36:24"},{"date":"2015-01-13T05:24:10","version":"0.32"},{"version":"0.33","date":"2015-01-13T07:52:20"},{"date":"2015-01-15T02:04:26","version":"0.34"},{"date":"2015-05-23T05:44:25","version":"0.35"},{"date":"2015-05-25T02:52:16","version":"0.36"},{"date":"2016-05-21T07:00:46","version":"0.37"},{"date":"2017-03-16T07:48:58","version":"0.38"},{"version":"0.39","date":"2017-03-29T02:29:03"},{"date":"2017-03-30T01:41:11","version":"0.40"},{"version":"0.41","date":"2017-11-06T15:17:26"},{"version":"0.41_99","date":"2019-10-15T04:14:26"},{"date":"2019-10-19T08:52:17","version":"0.42"},{"date":"2020-04-01T05:39:43","version":"0.43"},{"date":"2020-08-03T00:46:29","version":"0.44"},{"version":"0.45","date":"2021-12-16T00:31:02"}]},"Crypt-Salt":{"advisories":[{"references":["https://metacpan.org/release/HACHI/Crypt-Salt-0.01/source/lib/Crypt/Salt.pm#L76","https://perldoc.perl.org/functions/rand","https://security.metacpan.org/docs/guides/random-data-for-security.html"],"affected_versions":["<=0.01"],"severity":null,"reported":"2025-04-02","cves":["CVE-2025-1805"],"fixed_versions":[],"distribution":"Crypt-Salt","description":"Crypt::Salt for Perl version 0.01 uses insecure rand() function when generating salts for cryptographic purposes.","id":"CPANSA-Crypt-Salt-2025-1805"}],"main_module":"Crypt::Salt","versions":[{"version":"0.01","date":"2003-11-12T06:13:44"}]},"Log-Any":{"main_module":"Log::Any","versions":[{"date":"2009-07-11T14:11:33","version":"0.01"},{"date":"2009-07-14T23:34:51","version":"0.02"},{"version":"0.03","date":"2009-07-18T03:41:02"},{"version":"0.03","date":"2009-09-04T00:32:59"},{"date":"2009-10-27T22:26:20","version":"0.05"},{"date":"2009-10-31T23:24:23","version":"0.06"},{"version":"0.07","date":"2009-12-07T17:57:19"},{"version":"0.08","date":"2009-12-16T01:31:06"},{"date":"2010-01-05T21:20:31","version":"0.09"},{"version":"0.10","date":"2010-01-05T21:27:46"},{"version":"0.11","date":"2010-02-12T13:08:17"},{"date":"2011-03-23T21:55:43","version":"0.12"},{"version":"0.13","date":"2011-08-02T13:27:07"},{"date":"2011-08-31T22:51:22","version":"0.14"},{"date":"2013-04-10T17:16:43","version":"0.15"},{"version":"0.90","date":"2014-12-12T22:09:51"},{"version":"0.91","date":"2014-12-15T03:15:09"},{"version":"0.92","date":"2014-12-15T12:13:47"},{"date":"2014-12-26T03:04:57","version":"1.00"},{"version":"1.01","date":"2014-12-27T03:26:31"},{"version":"1.02","date":"2014-12-28T12:07:41"},{"date":"2015-01-02T03:43:07","version":"1.03"},{"date":"2015-03-26T10:09:30","version":"1.031"},{"date":"2015-03-26T21:24:48","version":"1.032"},{"date":"2016-02-03T15:34:02","version":"1.033"},{"date":"2016-02-04T19:48:49","version":"1.035"},{"version":"1.037","date":"2016-02-06T01:27:07"},{"version":"1.038","date":"2016-02-10T21:18:02"},{"version":"1.040","date":"2016-02-24T22:48:34"},{"version":"1.041","date":"2016-08-18T05:02:37"},{"version":"1.042","date":"2016-08-27T04:38:20"},{"version":"1.043","date":"2016-11-04T02:48:06"},{"version":"1.044","date":"2016-11-06T21:53:19"},{"version":"1.045","date":"2016-11-12T03:54:03"},{"version":"1.046","date":"2017-01-12T03:44:21"},{"date":"2017-03-23T01:25:09","version":"1.047"},{"version":"1.048","date":"2017-03-27T20:17:22"},{"version":"1.049","date":"2017-03-28T21:03:30"},{"version":"1.050","date":"2017-08-04T03:30:12"},{"version":"1.051","date":"2017-08-07T01:43:24"},{"date":"2017-09-28T22:00:06","version":"1.700"},{"date":"2017-10-02T19:38:09","version":"1.701"},{"date":"2017-11-28T21:20:01","version":"1.702"},{"version":"1.703","date":"2017-11-29T16:57:31"},{"version":"1.704","date":"2017-12-18T00:14:35"},{"date":"2018-01-17T19:50:35","version":"1.705"},{"version":"1.706","date":"2018-07-07T01:21:05"},{"version":"1.707","date":"2018-08-02T03:56:11"},{"date":"2020-01-13T03:58:06","version":"1.708"},{"version":"1.709","date":"2021-02-17T21:17:28"},{"version":"1.710","date":"2021-08-02T15:11:51"},{"version":"1.711","date":"2022-11-22T17:29:07"},{"version":"1.712","date":"2022-12-09T17:06:31"},{"version":"1.713","date":"2022-12-12T18:45:32"},{"version":"1.714","date":"2023-03-20T16:49:03"},{"date":"2023-05-04T18:09:55","version":"1.715"},{"version":"1.716","date":"2023-06-26T19:15:29"},{"version":"1.717","date":"2023-08-17T15:53:05"}],"advisories":[{"severity":null,"affected_versions":[">=1.712,<=1.715"],"references":["https://metacpan.org/dist/Log-Any/changes","https://github.com/preaction/Log-Any/pull/97"],"id":"CPANSA-Log-Any-2023-001","fixed_versions":["1.716"],"reported":null,"cves":[],"distribution":"Log-Any","description":"The WithStackTrace proxy may expose sensitive information\n"}]},"UI-Dialog":{"main_module":"UI::Dialog","versions":[{"date":"2004-01-04T10:51:34","version":"1.00"},{"date":"2004-01-13T00:08:39","version":"1.01"},{"date":"2004-02-15T11:03:37","version":"1.02"},{"version":"1.03","date":"2004-02-18T16:52:59"},{"version":"1.04","date":"2004-02-22T18:34:25"},{"version":"1.05","date":"2004-03-18T02:12:03"},{"version":"1.06","date":"2004-03-18T16:01:50"},{"version":"1.07","date":"2004-07-21T19:59:51"},{"date":"2004-10-05T00:46:22","version":"1.08"},{"date":"2013-08-10T09:39:07","version":"1.09"},{"version":"1.09","date":"2013-08-10T17:09:57"},{"version":"1.09","date":"2013-08-19T17:22:00"},{"version":"1.11","date":"2016-01-19T19:05:07"},{"version":"1.12","date":"2016-01-22T06:42:45"},{"version":"1.13","date":"2016-01-30T21:24:56"},{"version":"1.14","date":"2016-02-03T02:10:12"},{"date":"2016-02-09T00:11:17","version":"1.15"},{"version":"1.16","date":"2016-02-10T02:57:43"},{"date":"2016-02-12T05:25:14","version":"1.17"},{"date":"2016-02-13T02:56:26","version":"1.18"},{"date":"2016-02-21T23:33:48","version":"1.19"},{"version":"1.20","date":"2016-03-07T02:15:26"},{"version":"1.21","date":"2016-04-02T22:17:32"}],"advisories":[{"reported":"2015-10-10","cves":[],"fixed_versions":[">=1.11"],"description":"Allows remote attackers to execute arbitrary commands.\n","distribution":"UI-Dialog","id":"CPANSA-UI-Dialog-2015-01","references":["https://metacpan.org/changes/distribution/UI-Dialog"],"affected_versions":["<1.11"]},{"references":["https://metacpan.org/changes/distribution/UI-Dialog"],"affected_versions":["<1.03"],"description":"CDialog and Whiptail backends usage of the temp files.\n","distribution":"UI-Dialog","cves":[],"reported":"2004-02-18","fixed_versions":[">=1.03"],"id":"CPANSA-UI-Dialog-2004-01"},{"id":"CPANSA-UI-Dialog-2008-7315","distribution":"UI-Dialog","description":"UI-Dialog 1.09 and earlier allows remote attackers to execute arbitrary commands.\n","reported":"2017-10-10","cves":["CVE-2008-7315"],"fixed_versions":[">1.09"],"severity":"critical","affected_versions":["<=1.09"],"references":["https://security-tracker.debian.org/tracker/CVE-2008-7315/","https://rt.cpan.org/Public/Bug/Display.html?id=107364","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496448","http://www.securityfocus.com/bid/77031/info","http://www.openwall.com/lists/oss-security/2015/10/08/6"]}]},"Plack-Middleware-StaticShared":{"advisories":[{"severity":null,"affected_versions":["<0.04"],"references":["https://metacpan.org/dist/Plack-Middleware-StaticShared/changes"],"id":"CPANSA-Plack-Middleware-StaticShared-2012-01","distribution":"Plack-Middleware-StaticShared","description":"Vulnerability of directory traversal.\n","reported":"2012-04-26","fixed_versions":[">=0.04"],"cves":[]}],"main_module":"Plack::Middleware::StaticShared","versions":[{"date":"2010-12-03T11:42:11","version":"0.01"},{"date":"2011-08-03T00:32:41","version":"0.02"},{"date":"2011-08-10T14:36:03","version":"0.03"},{"version":"0.04","date":"2012-04-26T03:37:11"},{"version":"0.05","date":"2013-01-24T10:40:54"},{"date":"2016-06-09T03:53:36","version":"0.06"}]},"HTML-Template-Pro":{"main_module":"HTML::Template::Pro","versions":[{"version":"0.38","date":"2005-06-09T11:07:59"},{"date":"2005-06-22T09:55:37","version":"0.39"},{"version":"0.40","date":"2005-07-07T09:11:59"},{"version":"0.41","date":"2005-07-26T16:58:29"},{"version":"0.42","date":"2005-08-04T15:58:27"},{"date":"2005-08-04T17:36:21","version":"0.43"},{"version":"0.44","date":"2005-08-12T16:32:44"},{"date":"2005-08-19T19:10:08","version":"0.45"},{"version":"0.46","date":"2005-08-26T18:24:23"},{"version":"0.48","date":"2005-08-31T17:43:09"},{"version":"0.50","date":"2005-09-08T17:43:14"},{"date":"2005-09-30T15:59:34","version":"0.52"},{"version":"0.53","date":"2005-10-06T17:14:51"},{"date":"2005-10-17T13:37:05","version":"0.54"},{"version":"0.55","date":"2005-10-26T12:18:18"},{"date":"2005-11-03T16:46:06","version":"0.56"},{"version":"0.57","date":"2005-11-13T16:12:39"},{"date":"2005-12-02T08:10:18","version":"0.58"},{"version":"0.59","date":"2006-01-22T20:07:54"},{"version":"0.60","date":"2006-02-02T16:32:55"},{"version":"0.61","date":"2006-02-06T20:45:02"},{"version":"0.62","date":"2006-02-22T20:05:55"},{"version":"0.64","date":"2006-04-18T20:24:51"},{"date":"2007-06-01T14:46:48","version":"0.65"},{"version":"0.66","date":"2007-10-04T11:08:55"},{"date":"2007-12-02T23:20:56","version":"0.67"},{"date":"2008-01-08T18:01:32","version":"0.68"},{"version":"0.68","date":"2008-01-08T20:03:26"},{"date":"2008-03-01T19:46:47","version":"0.69"},{"version":"0.70","date":"2008-06-09T09:06:12"},{"date":"2008-09-05T19:36:06","version":"0.71"},{"date":"2008-12-19T08:16:12","version":"0.72"},{"date":"2009-04-02T20:36:25","version":"0.73"},{"version":"0.74","date":"2009-04-10T20:41:07"},{"version":"0.75","date":"2009-07-05T16:40:09"},{"date":"2009-07-13T08:33:36","version":"0.76"},{"date":"2009-07-23T17:37:10","version":"0.80"},{"version":"0.81","date":"2009-07-28T15:58:37"},{"date":"2009-08-04T15:46:34","version":"0.82"},{"version":"0.83","date":"2009-08-05T20:27:52"},{"date":"2009-08-08T18:13:20","version":"0.84"},{"date":"2009-08-09T16:45:02","version":"0.85"},{"date":"2009-08-24T08:00:34","version":"0.86"},{"date":"2009-08-29T19:22:41","version":"0.87"},{"date":"2009-09-11T16:53:57","version":"0.90"},{"version":"0.91","date":"2009-09-24T15:48:49"},{"version":"0.92","date":"2009-09-29T20:14:35"},{"date":"2009-11-23T20:25:34","version":"0.93"},{"date":"2010-03-26T19:12:55","version":"0.94"},{"date":"2010-05-21T19:34:29","version":"0.95"},{"version":"0.9501","date":"2010-06-16T19:00:45"},{"version":"0.9502","date":"2010-06-24T18:50:34"},{"version":"0.9503","date":"2010-08-29T12:45:12"},{"date":"2010-09-29T07:16:03","version":"0.9504"},{"date":"2011-07-01T10:40:21","version":"0.9505"},{"version":"0.9506","date":"2011-10-04T20:31:16"},{"date":"2011-12-09T07:59:17","version":"0.9507"},{"date":"2011-12-26T21:57:41","version":"0.9508"},{"version":"0.9509","date":"2012-02-28T19:59:05"},{"date":"2013-05-13T08:40:09","version":"0.9510"},{"version":"0.9520","date":"2021-11-30T23:21:23"},{"version":"0.9521","date":"2021-12-02T07:27:12"},{"version":"0.9522","date":"2021-12-06T17:53:48"},{"date":"2021-12-15T09:50:03","version":"0.9523"},{"date":"2022-01-16T20:42:34","version":"0.9524"}],"advisories":[{"references":["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652587","http://openwall.com/lists/oss-security/2011/12/19/1","http://metacpan.org/diff/release/VIY/HTML-Template-Pro-0.9505/VIY/HTML-Template-Pro-0.9507","http://secunia.com/advisories/47184","http://cpansearch.perl.org/src/VIY/HTML-Template-Pro-0.9507/Changes","http://www.securityfocus.com/bid/51117","http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089603.html","http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089889.html","http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089888.html"],"affected_versions":["<0.9507"],"severity":null,"description":"Cross-site scripting (XSS) vulnerability in the HTML-Template-Pro module before 0.9507 for Perl allows remote attackers to inject arbitrary web script or HTML via template parameters, related to improper handling of > (greater than) and < (less than) characters.\n","distribution":"HTML-Template-Pro","reported":"2012-01-06","fixed_versions":[">=0.9507"],"cves":["CVE-2011-4616"],"id":"CPANSA-HTML-Template-Pro-2011-4616"}]},"Dancer":{"advisories":[{"distribution":"Dancer","description":"CRLF injection vulnerability in the cookie method allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a cookie name.\n","fixed_versions":[">=1.3114"],"reported":"2014-05-30","cves":["CVE-2012-5572"],"id":"CPANSA-Dancer-2014-01","affected_versions":["<1.3114"],"references":["https://metacpan.org/changes/distribution/Dancer","https://github.com/PerlDancer/Dancer/commit/46ef9124f3149f697455061499ac7cee40930349"]},{"id":"CPANSA-Dancer-2011-01","fixed_versions":[">=1.3051"],"reported":"2011-04-05","cves":["CVE-2011-1589"],"description":"Directory traversal vulnerability (Mojolicious report, but Dancer was vulnerable as well).\n","distribution":"Dancer","affected_versions":["<1.3051"],"references":["https://metacpan.org/changes/distribution/Dancer","https://github.com/PerlDancer/Dancer/commit/91d0bf6a36705b0971b18f7d38fa2f3df8c7b994"]}],"versions":[{"version":"20090727.1315","date":"2009-07-27T13:18:07"},{"date":"2009-07-27T14:14:13","version":"0_0.99"},{"date":"2009-08-01T13:48:20","version":"0.9901"},{"date":"2009-08-04T10:01:54","version":"0.9902"},{"date":"2009-08-07T12:29:03","version":"0.9003"},{"version":"0.9904","date":"2009-09-19T15:30:19"},{"date":"2009-09-23T21:33:51","version":"0.9905"},{"version":"1.000","date":"2009-11-20T11:14:20"},{"version":"1.100","date":"2010-01-06T13:53:28"},{"version":"1.110","date":"2010-01-11T09:46:45"},{"date":"2010-01-15T16:03:35","version":"1.120"},{"version":"1.121","date":"2010-01-15T17:53:08"},{"version":"1.122","date":"2010-01-20T07:48:38"},{"date":"2010-01-29T17:29:24","version":"1.130"},{"date":"2010-02-09T07:55:18","version":"1.140"},{"date":"2010-02-17T15:09:48","version":"1.150"},{"version":"1.160","date":"2010-03-07T17:50:01"},{"date":"2010-03-24T11:19:00","version":"1.170"},{"version":"1.171","date":"2010-03-24T13:44:04"},{"date":"2010-03-28T15:09:59","version":"1.172"},{"date":"2010-04-01T14:13:30","version":"1.173"},{"date":"2010-04-04T11:03:53","version":"1.173_01"},{"version":"1.174","date":"2010-04-08T13:49:39"},{"date":"2010-04-11T10:49:39","version":"1.175"},{"date":"2010-04-19T08:43:22","version":"1.175_01"},{"version":"1.176","date":"2010-04-22T20:29:56"},{"version":"1.178_01","date":"2010-05-05T12:21:26"},{"version":"1.1800","date":"2010-05-16T10:28:47"},{"version":"1.1801","date":"2010-05-19T14:17:57"},{"date":"2010-05-19T17:32:52","version":"1.1802"},{"date":"2010-05-23T20:45:17","version":"1.1803"},{"version":"1.1804","date":"2010-06-18T11:59:20"},{"version":"1.1805","date":"2010-06-22T06:41:58"},{"date":"2010-07-07T06:15:55","version":"1.1806_01"},{"version":"1.1806_02","date":"2010-08-14T16:37:45"},{"version":"1.1807","date":"2010-08-23T17:47:12"},{"date":"2010-08-24T06:23:38","version":"1.1808"},{"version":"1.1809","date":"2010-08-25T05:41:15"},{"version":"1.1810","date":"2010-09-01T06:19:20"},{"version":"1.1811","date":"2010-09-03T09:23:14"},{"version":"1.1812","date":"2010-09-21T12:19:35"},{"version":"1.1901","date":"2010-09-24T14:25:44"},{"version":"1.1999_01","date":"2010-10-14T09:25:03"},{"version":"1.1999_02","date":"2010-10-28T15:41:17"},{"date":"2010-11-02T14:14:32","version":"1.1902"},{"version":"1.1902","date":"2010-11-02T14:25:04"},{"date":"2010-11-03T17:07:29","version":"1.1903"},{"date":"2010-11-04T11:16:17","version":"1.1904"},{"version":"1.1999_03","date":"2010-11-11T07:43:21"},{"version":"1.1999_04","date":"2010-11-14T08:08:56"},{"date":"2010-11-18T15:54:33","version":"1.200"},{"date":"2010-11-18T16:52:47","version":"1.2000"},{"version":"1.2000_01","date":"2010-11-29T22:05:38"},{"version":"1.2000_02","date":"2010-11-30T10:00:23"},{"version":"1.2001","date":"2010-11-30T19:59:09"},{"version":"1.2001_01","date":"2010-12-02T12:18:12"},{"version":"1.2002","date":"2010-12-03T20:28:56"},{"version":"1.2002_01","date":"2010-12-07T18:05:50"},{"version":"1.2002_02","date":"2010-12-08T21:38:17"},{"date":"2010-12-10T18:28:16","version":"1.2003"},{"version":"1.3000_01","date":"2010-12-22T17:57:55"},{"date":"2011-01-03T15:17:14","version":"1.3000_02"},{"date":"2011-01-27T10:00:22","version":"1.2004"},{"date":"2011-01-27T10:09:31","version":"1.3001"},{"version":"1.3002","date":"2011-02-02T15:42:28"},{"version":"1.2005","date":"2011-02-05T17:07:15"},{"version":"1.3003","date":"2011-02-06T13:12:28"},{"version":"1.3010","date":"2011-02-10T20:48:48"},{"version":"1.3010_01","date":"2011-02-12T12:50:18"},{"date":"2011-02-14T15:58:10","version":"1.3011"},{"date":"2011-03-01T19:00:52","version":"1.3012"},{"date":"2011-03-03T08:41:00","version":"1.3013"},{"date":"2011-03-04T12:56:36","version":"1.3014"},{"version":"1.3014_01","date":"2011-03-10T14:16:24"},{"version":"1.3019_01","date":"2011-03-13T13:17:43"},{"version":"1.3019_02","date":"2011-03-14T07:44:57"},{"version":"1.3020","date":"2011-03-21T13:44:17"},{"date":"2011-04-01T15:22:58","version":"1.3029_01"},{"date":"2011-04-08T20:07:26","version":"1.3029_02"},{"version":"1.3029_03","date":"2011-04-10T08:18:44"},{"date":"2011-04-13T08:26:50","version":"1.3030"},{"date":"2011-04-27T14:58:57","version":"1.3039_01"},{"version":"1.3040","date":"2011-05-01T14:55:49"},{"version":"1.3049_01","date":"2011-05-14T15:03:00"},{"version":"1.3050","date":"2011-05-20T10:57:10"},{"version":"1.3051","date":"2011-05-27T12:57:27"},{"date":"2011-05-27T13:07:51","version":"1.3059_01"},{"version":"1.3059_02","date":"2011-05-29T14:06:24"},{"version":"1.3059_03","date":"2011-06-11T14:02:50"},{"version":"1.3059_04","date":"2011-06-12T17:31:55"},{"date":"2011-06-15T10:35:07","version":"1.3060"},{"version":"1.3069_01","date":"2011-07-07T13:19:45"},{"date":"2011-07-10T16:14:53","version":"1.3069_02"},{"version":"1.3070","date":"2011-07-14T13:47:19"},{"version":"1.3071","date":"2011-07-26T16:21:51"},{"date":"2011-08-17T15:27:53","version":"1.3079_01"},{"version":"1.3072","date":"2011-08-23T09:55:46"},{"date":"2011-08-28T14:13:40","version":"1.3079_02"},{"date":"2011-09-10T15:10:29","version":"1.3079_03"},{"date":"2011-10-02T16:07:02","version":"1.3079_04"},{"version":"1.3079_05","date":"2011-10-18T14:43:22"},{"version":"1.3080","date":"2011-10-25T21:16:42"},{"date":"2011-11-27T06:51:43","version":"1.3089_01"},{"version":"1.3090","date":"2011-12-13T14:41:24"},{"date":"2011-12-17T11:09:48","version":"1.3091"},{"version":"1.3092","date":"2012-01-27T14:38:05"},{"date":"2012-02-29T14:34:55","version":"1.3093"},{"date":"2012-03-31T09:57:40","version":"1.3094"},{"date":"2012-04-01T19:22:56","version":"1.3095"},{"date":"2012-06-22T20:18:54","version":"1.3095_01"},{"date":"2012-07-03T07:27:28","version":"1.3095_02"},{"date":"2012-07-05T23:09:20","version":"1.3096"},{"version":"1.3097","date":"2012-07-08T18:36:14"},{"date":"2012-07-28T14:40:15","version":"1.3098"},{"version":"1.3099","date":"2012-08-11T13:54:49"},{"version":"1.3100","date":"2012-08-25T19:42:47"},{"date":"2012-10-06T13:24:53","version":"1.3110"},{"date":"2012-12-24T13:17:58","version":"1.9999_01"},{"version":"1.9999_02","date":"2012-12-24T13:48:35"},{"date":"2013-01-22T21:38:11","version":"2.0000_01"},{"date":"2013-02-22T15:33:14","version":"2.000001"},{"date":"2013-02-24T22:51:59","version":"1.3111"},{"date":"2013-03-30T16:33:05","version":"1.3111_01"},{"version":"1.3111_02","date":"2013-04-01T22:31:08"},{"version":"1.3112","date":"2013-04-11T01:04:37"},{"version":"1.3113","date":"2013-05-09T00:36:16"},{"date":"2013-06-02T16:49:58","version":"1.3114"},{"date":"2013-06-09T23:54:16","version":"1.3115"},{"version":"1.3116","date":"2013-07-04T01:35:27"},{"date":"2013-07-31T22:40:52","version":"1.3117"},{"date":"2013-09-01T16:45:13","version":"1.3118"},{"date":"2013-10-26T19:42:59","version":"1.3119"},{"date":"2013-12-24T16:23:20","version":"1.3120"},{"version":"1.3121","date":"2014-02-02T22:26:53"},{"version":"1.3122","date":"2014-04-10T23:16:40"},{"date":"2014-04-12T15:47:53","version":"1.3123"},{"version":"1.3124","date":"2014-05-10T16:15:17"},{"date":"2014-07-12T17:19:08","version":"1.3125"},{"date":"2014-07-15T02:01:21","version":"1.3126"},{"date":"2014-09-09T00:49:19","version":"1.3127"},{"version":"1.3128","date":"2014-09-09T11:47:21"},{"version":"1.3129","date":"2014-09-10T00:50:37"},{"version":"1.3130","date":"2014-09-16T01:21:25"},{"date":"2014-10-11T18:59:22","version":"1.3131_0"},{"version":"1.3131_1","date":"2014-10-13T23:25:36"},{"date":"2014-10-20T23:14:23","version":"1.3132"},{"date":"2014-11-26T22:20:35","version":"1.3133"},{"date":"2015-02-23T01:33:08","version":"1.3134"},{"version":"1.3135","date":"2015-04-23T01:54:25"},{"date":"2015-05-24T15:48:19","version":"1.3136"},{"date":"2015-06-05T20:05:21","version":"1.3137"},{"version":"1.3138","date":"2015-06-12T20:55:50"},{"date":"2015-06-25T20:13:45","version":"1.3139"},{"version":"1.3140","date":"2015-07-03T13:56:32"},{"date":"2015-09-07T15:15:26","version":"1.3141"},{"date":"2015-09-15T00:52:23","version":"1.3142"},{"version":"1.3143","date":"2015-10-26T21:15:31"},{"date":"2015-11-04T12:36:07","version":"1.3144"},{"date":"2015-11-06T22:12:42","version":"1.3200"},{"version":"1.3201","date":"2015-11-07T19:27:25"},{"date":"2015-11-07T21:52:17","version":"1.3202"},{"version":"1.3300","date":"2016-02-15T21:33:45"},{"version":"1.3301","date":"2016-02-16T22:42:44"},{"date":"2018-05-20T19:52:07","version":"1.3203"},{"date":"2018-05-23T13:43:34","version":"1.3204"},{"date":"2018-06-13T22:02:36","version":"1.3205"},{"version":"1.3400","date":"2018-06-15T22:11:45"},{"date":"2018-10-01T11:53:31","version":"1.3401"},{"date":"2018-10-10T10:44:29","version":"1.3402"},{"date":"2018-10-11T22:45:37","version":"1.3403"},{"date":"2018-10-12T20:33:54","version":"1.3500"},{"date":"2019-03-14T19:27:25","version":"1.3501"},{"date":"2019-03-19T14:49:14","version":"1.3510"},{"date":"2019-03-29T11:18:31","version":"1.3511"},{"date":"2019-03-31T19:16:29","version":"1.3512"},{"date":"2020-01-29T21:03:12","version":"1.3513"},{"version":"1.3514","date":"2020-06-29T16:44:22"},{"date":"2020-10-02T20:51:17","version":"1.3514_02"},{"date":"2020-10-06T21:24:49","version":"1.3514_03"},{"date":"2022-06-29T22:00:04","version":"1.3514_04"},{"version":"1.3520","date":"2023-01-02T10:57:26"},{"date":"2023-02-05T23:40:49","version":"1.3521"},{"version":"1.3521","date":"2023-02-08T20:58:09"}],"main_module":"Dancer"},"Crypt-Random-Source":{"main_module":"Crypt::Random::Source","versions":[{"date":"2008-06-17T00:15:09","version":"0.01_01"},{"date":"2008-06-17T01:51:37","version":"0.01"},{"date":"2008-06-17T01:53:15","version":"0.02"},{"date":"2008-06-17T06:01:16","version":"0.03"},{"date":"2009-11-25T17:09:48","version":"0.04"},{"date":"2009-11-25T17:11:14","version":"0.05"},{"date":"2010-12-23T03:04:46","version":"0.06"},{"date":"2011-01-05T08:42:20","version":"0.07"},{"date":"2014-08-05T00:05:07","version":"0.08"},{"date":"2014-08-30T17:12:48","version":"0.09"},{"version":"0.10","date":"2014-08-31T18:06:40"},{"date":"2015-10-24T04:00:11","version":"0.11"},{"date":"2016-03-11T03:43:41","version":"0.12"},{"version":"0.13","date":"2018-04-08T01:09:20"},{"date":"2018-04-10T02:58:59","version":"0.14"}],"advisories":[{"description":"In versions prior to 0.13, rand could be used as a result of calling get_weak, or get, if no random device was available. This implies that not explicitly asking for get_strong on a non POSIX operating system (e.g. Win32 without the Win32 backend) could have resulted in non cryptographically random data.\n","distribution":"Crypt-Random-Source","cves":["CVE-2018-25107"],"reported":null,"fixed_versions":[">=0.13"],"id":"CPANSA-Crypt-Random-Source-2024-001","references":["https://metacpan.org/dist/Crypt-Random-Source/changes","https://nvd.nist.gov/vuln/detail/CVE-2018-25107","https://github.com/karenetheridge/Crypt-Random-Source/pull/3","https://metacpan.org/release/ETHER/Crypt-Random-Source-0.13/changes"],"affected_versions":["<=0.12"],"severity":null}]},"HTML-Perlinfo":{"advisories":[{"references":["https://metacpan.org/changes/release/ACCARDO/HTML-Perlinfo-1.52"],"affected_versions":["<1.52"],"reported":"2008-07-04","cves":[],"fixed_versions":[">=1.52"],"distribution":"HTML-Perlinfo","description":"Possibility of denial-of-service attack.\n","id":"CPANSA-HTML-Perlinfo-2008-01"}],"versions":[{"version":"1.00","date":"2005-08-18T21:39:08"},{"version":"1.05","date":"2005-09-19T20:41:07"},{"date":"2006-01-14T05:25:20","version":"1.25"},{"version":"1.40","date":"2006-08-13T03:42:36"},{"version":"1.41","date":"2006-08-13T09:29:45"},{"date":"2006-08-15T01:04:34","version":"1.42"},{"date":"2006-08-25T07:51:28","version":"1.43"},{"version":"1.44","date":"2006-09-10T23:20:13"},{"version":"1.45","date":"2006-09-24T02:22:48"},{"version":"1.46","date":"2006-09-27T20:08:12"},{"date":"2006-10-02T19:30:30","version":"1.47"},{"date":"2008-03-16T03:15:04","version":"1.48"},{"date":"2008-04-26T04:17:07","version":"1.49"},{"version":"1.50","date":"2008-04-30T20:44:40"},{"version":"1.51","date":"2008-06-08T21:07:29"},{"date":"2008-07-03T23:57:26","version":"1.52"},{"version":"1.53","date":"2008-07-21T22:24:22"},{"version":"1.54","date":"2008-07-27T23:52:36"},{"version":"1.55","date":"2009-04-08T01:09:54"},{"version":"1.56","date":"2009-04-08T19:06:59"},{"date":"2009-04-16T15:57:34","version":"1.57"},{"date":"2009-04-17T02:41:48","version":"1.58"},{"version":"1.59","date":"2009-04-22T03:29:45"},{"version":"1.60","date":"2009-05-02T20:48:38"},{"date":"2009-05-02T22:21:42","version":"1.60"},{"date":"2009-05-03T23:02:35","version":"1.61"},{"version":"1.62","date":"2011-06-13T19:28:39"},{"date":"2014-08-19T21:37:30","version":"1.63"},{"date":"2014-08-19T22:29:15","version":"1.64"},{"version":"1.65","date":"2015-06-06T23:25:41"},{"version":"1.66","date":"2015-06-08T18:20:03"},{"date":"2015-06-08T20:22:33","version":"1.67"},{"version":"1.68","date":"2015-06-12T02:03:18"},{"date":"2016-11-29T19:21:00","version":"1.69"},{"version":"1.70","date":"2019-06-24T15:33:44"},{"date":"2019-06-25T02:15:30","version":"1.71"},{"version":"1.72","date":"2019-07-02T19:22:14"},{"version":"1.73","date":"2019-07-02T20:41:23"}],"main_module":"HTML::Perlinfo"},"Clipboard":{"advisories":[{"distribution":"Clipboard","description":"clipedit in the Clipboard module for Perl allows local users to delete arbitrary files via a symlink attack on /tmp/clipedit$$.\n","reported":"2018-01-08","fixed_versions":[">=0.16"],"cves":["CVE-2014-5509"],"id":"CPANSA-Clipboard-2014-5509","references":["https://rt.cpan.org/Public/Bug/Display.html?id=98435","https://bugzilla.redhat.com/show_bug.cgi?id=1135624","http://www.securityfocus.com/bid/69473","http://www.openwall.com/lists/oss-security/2014/08/30/2"],"affected_versions":["<0.16"],"severity":"medium"}],"versions":[{"date":"2005-05-01T17:19:57","version":"0.01"},{"version":"0.02","date":"2005-05-02T06:17:33"},{"version":"0.03","date":"2005-05-04T06:17:44"},{"version":"0.04","date":"2005-05-08T05:54:44"},{"date":"2005-06-01T17:00:34","version":"0.06"},{"date":"2005-06-02T05:06:37","version":"0.07"},{"date":"2005-06-22T17:05:15","version":"0.08"},{"version":"0.09","date":"2005-11-19T06:12:48"},{"version":"0.10","date":"2010-10-07T01:39:10"},{"date":"2010-10-07T04:49:39","version":"0.11"},{"version":"0.12","date":"2010-10-11T06:13:22"},{"date":"2010-10-13T04:46:50","version":"0.13"},{"date":"2019-01-30T10:47:45","version":"0.14"},{"date":"2019-01-30T11:00:22","version":"0.15"},{"date":"2019-01-30T11:22:23","version":"0.16"},{"version":"0.17","date":"2019-01-30T14:00:52"},{"version":"0.18","date":"2019-01-30T20:12:11"},{"date":"2019-01-31T11:00:20","version":"0.19"},{"version":"0.20","date":"2019-04-17T20:55:35"},{"date":"2019-12-02T06:04:27","version":"0.21"},{"version":"0.22","date":"2020-01-28T18:10:34"},{"version":"0.23","date":"2020-03-06T15:43:11"},{"version":"0.24","date":"2020-03-07T08:25:07"},{"version":"0.25","date":"2020-05-14T06:33:28"},{"date":"2020-05-16T07:56:58","version":"0.26"},{"version":"0.27","date":"2021-02-13T18:13:34"},{"version":"0.28","date":"2021-02-23T07:47:20"},{"version":"0.29","date":"2024-04-07T03:11:57"},{"date":"2024-06-16T12:03:21","version":"0.30"},{"date":"2025-01-21T17:04:47","version":"0.31"},{"date":"2025-02-10T08:24:16","version":"0.32"}],"main_module":"Clipboard"},"DBD-mysqlPP":{"main_module":"DBD::mysqlPP","versions":[{"date":"2002-04-04T07:20:36","version":"0.02"},{"date":"2002-04-15T10:26:39","version":"0.03"},{"version":"0.04","date":"2003-01-24T11:14:14"},{"date":"2011-10-21T23:07:07","version":"0.05"},{"version":"0.06","date":"2011-10-26T22:17:22"},{"version":"0.07","date":"2011-11-17T22:24:50"}],"advisories":[{"id":"CPANSA-DBD-mysqlPP-2011-01","description":"SQL injection.\n","distribution":"DBD-mysqlPP","reported":"2011-10-14","cves":[],"fixed_versions":[">=0.03"],"severity":"high","references":["https://metacpan.org/changes/distribution/DBD-mysqlPP","https://jvn.jp/en/jp/JVN51216285/index.html"],"affected_versions":["<0.93"]}]},"MHonArc":{"main_module":"MHonArc::UTF8","versions":[{"date":"1997-12-11T20:44:41","version":"2.1"},{"date":"1998-03-04T01:06:00","version":"v2.2.0"},{"version":"v2.3.0","date":"1998-10-11T02:56:10"},{"version":"v2.3.1","date":"1998-10-25T19:27:37"},{"date":"1998-11-01T20:02:48","version":"v2.3.2"},{"date":"1998-11-08T21:59:21","version":"v2.3.3"},{"date":"1999-06-26T07:57:53","version":"v2.4.0"},{"version":"v2.4.1","date":"1999-07-26T19:30:51"},{"version":"v2.4.2","date":"1999-08-12T07:16:14"},{"version":"v2.4.3","date":"1999-08-16T06:25:39"},{"date":"1999-10-01T19:43:07","version":"v2.4.4"},{"date":"2000-02-15T03:44:03","version":"v2.4.5"},{"date":"2000-04-24T08:35:56","version":"v2.4.6"},{"version":"v2.4.7","date":"2000-10-29T04:18:32"},{"date":"2000-10-30T06:29:47","version":"v2.4.7"},{"date":"2001-04-14T21:48:01","version":"v2.4.8"},{"date":"2001-06-11T03:09:13","version":"v2.4.9"},{"date":"2001-08-26T19:46:53","version":"v2.5.0"},{"version":"v2.5.0","date":"2001-09-07T15:24:19"},{"version":"v2.5.0","date":"2001-10-17T16:03:13"},{"version":"v2.5.1","date":"2001-11-14T05:09:59"},{"date":"2001-11-25T06:46:19","version":"v2.5.2"},{"date":"2002-04-18T07:23:29","version":"v2.5.3"},{"version":"v2.5.4","date":"2002-05-03T05:06:16"},{"date":"2002-05-28T05:43:00","version":"v2.5.5"},{"version":"v2.5.6","date":"2002-06-18T18:07:38"},{"version":"v2.5.7","date":"2002-06-21T22:59:36"},{"version":"v2.5.8","date":"2002-06-29T03:22:26"},{"date":"2002-07-20T02:39:53","version":"v2.5.9"},{"version":"v2.5.10","date":"2002-07-29T00:10:32"},{"date":"2002-08-04T04:25:22","version":"v2.5.11"},{"version":"v2.5.12","date":"2002-09-04T04:32:14"},{"version":"v2.5.13","date":"2002-10-21T17:13:35"},{"version":"v2.5.14","date":"2002-12-22T01:07:40"},{"date":"2003-02-10T05:23:02","version":"v2.6.0"},{"date":"2003-02-23T00:39:05","version":"v2.6.1"},{"date":"2003-03-12T01:55:48","version":"v2.6.2"},{"date":"2003-04-06T02:11:59","version":"v2.6.3"},{"date":"2003-06-22T21:54:52","version":"v2.6.4"},{"version":"v2.6.5","date":"2003-07-20T04:51:56"},{"date":"2003-07-21T17:20:07","version":"v2.6.6"},{"date":"2003-08-07T23:49:43","version":"v2.6.7"},{"version":"v2.6.8","date":"2003-08-13T04:47:02"},{"date":"2004-05-17T06:24:46","version":"v2.6.9"},{"version":"v2.6.10","date":"2004-05-17T06:25:16"},{"version":"v2.6.11","date":"2005-05-20T17:15:40"},{"version":"v2.6.12","date":"2005-06-09T02:30:11"},{"date":"2005-07-06T05:15:55","version":"v2.6.13"},{"version":"2.6.14","date":"2005-07-23T07:15:49"},{"version":"2.6.15","date":"2005-07-27T03:46:13"},{"date":"2006-06-10T03:21:01","version":"2.6.16"},{"date":"2011-01-09T10:04:06","version":"2.6.17"},{"version":"2.6.18","date":"2011-01-09T16:35:39"},{"date":"2014-04-22T03:33:53","version":"2.6.19"},{"date":"2020-09-14T09:22:58","version":"v2.6.20"},{"date":"2020-09-14T11:54:14","version":"v2.6.21"},{"version":"v2.6.22","date":"2020-09-21T07:06:18"},{"date":"2020-11-12T12:54:55","version":"v2.6.23"},{"date":"2020-11-16T14:24:54","version":"v2.6.24"}],"advisories":[{"distribution":"MHonArc","description":"Improper escaping of certain HTML sequences (XSS).\n","reported":"2011-01-09","fixed_versions":[">=2.6.17"],"cves":["CVE-2010-4524"],"id":"CPANSA-MHonArc-2011-01","references":["https://metacpan.org/changes/distribution/MHonArc"],"affected_versions":["<2.6.17"]},{"id":"CPANSA-MHonArc-2011-02","reported":"2011-01-09","fixed_versions":[">=2.6.17"],"cves":["CVE-2010-1677"],"description":"DoS when processing html messages with deep tag nesting.\n","distribution":"MHonArc","affected_versions":["<2.6.17"],"references":["https://metacpan.org/changes/distribution/MHonArc"]}]},"App-perlall":{"main_module":"App::perlall","versions":[{"date":"2011-12-23T21:52:22","version":"0.01"},{"version":"0.02","date":"2011-12-24T00:56:03"},{"version":"0.03","date":"2012-01-06T17:07:08"},{"date":"2012-01-09T22:05:35","version":"0.04"},{"date":"2012-01-31T21:18:20","version":"0.05"},{"version":"0.06","date":"2012-02-06T23:12:27"},{"date":"2012-02-07T20:52:55","version":"0.07"},{"date":"2012-02-23T10:35:50","version":"0.08"},{"version":"0.09","date":"2012-03-22T18:24:53"},{"date":"2012-05-03T13:44:26","version":"0.10"},{"date":"2012-05-05T02:22:56","version":"0.11"},{"date":"2012-05-05T14:18:09","version":"0.12"},{"date":"2012-05-29T15:34:02","version":"0.13"},{"version":"0.14","date":"2012-06-07T16:07:09"},{"version":"0.15","date":"2012-07-18T17:55:03"},{"date":"2012-07-18T18:05:33","version":"0.15_01"},{"version":"0.16","date":"2012-07-19T19:07:14"},{"version":"0.17","date":"2012-08-06T15:11:54"},{"version":"0.18","date":"2012-11-06T22:12:59"},{"version":"0.19","date":"2012-11-08T15:37:31"},{"version":"0.20","date":"2012-11-08T15:50:30"},{"date":"2012-11-08T18:53:37","version":"0.21"},{"version":"0.22","date":"2012-11-09T22:04:21"},{"version":"0.23","date":"2012-11-11T19:50:41"},{"version":"0.25","date":"2012-11-13T20:46:09"},{"version":"0.26","date":"2012-11-13T22:45:49"},{"version":"0.27","date":"2012-11-15T16:26:40"},{"date":"2012-12-13T20:09:18","version":"0.28"},{"version":"0.29","date":"2012-12-20T22:29:59"},{"date":"2013-01-09T20:22:21","version":"0.30"},{"version":"0.31","date":"2013-02-04T19:58:18"},{"version":"0.32","date":"2013-02-23T21:35:31"},{"version":"0.33","date":"2013-03-05T01:04:28"},{"version":"0.34","date":"2013-03-05T15:34:37"},{"date":"2013-03-22T22:34:57","version":"0.35"},{"date":"2013-07-11T19:58:07","version":"0.36"},{"date":"2013-07-13T19:53:25","version":"0.37"},{"version":"0.39","date":"2013-10-23T15:58:48"},{"version":"0.40","date":"2013-11-18T16:12:38"},{"date":"2013-12-03T17:08:11","version":"0.41"},{"version":"0.42","date":"2013-12-06T18:40:51"},{"date":"2013-12-09T18:31:19","version":"0.43"},{"version":"0.44","date":"2014-01-11T23:39:19"},{"version":"0.45","date":"2014-07-25T13:36:23"},{"date":"2014-08-10T01:42:03","version":"0.46"},{"version":"0.47","date":"2015-07-08T07:43:56"},{"version":"0.48","date":"2015-10-06T09:33:35"},{"version":"0.49","date":"2015-11-27T15:53:11"},{"date":"2016-06-12T12:48:37","version":"0.50"},{"date":"2019-12-10T20:02:45","version":"0.51"}],"advisories":[{"id":"CPANSA-App-perlall-2013-1667","reported":"2013-03-14","cves":["CVE-2013-1667"],"fixed_versions":[">=0.33"],"distribution":"App-perlall","description":"The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.\n","severity":null,"affected_versions":["<0.33"],"references":["http://www.securityfocus.com/bid/58311","http://perl5.git.perl.org/perl.git/commitdiff/d59e31f","http://perl5.git.perl.org/perl.git/commitdiff/9d83adc","http://www.nntp.perl.org/group/perl.perl5.porters/2013/03/msg199755.html","http://www.debian.org/security/2013/dsa-2641","http://secunia.com/advisories/52499","http://secunia.com/advisories/52472","https://bugzilla.redhat.com/show_bug.cgi?id=912276","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702296","http://perl5.git.perl.org/perl.git/commitdiff/6e79fe5","http://osvdb.org/90892","http://www.ubuntu.com/usn/USN-1770-1","http://rhn.redhat.com/errata/RHSA-2013-0685.html","http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html","http://marc.info/?l=bugtraq&m=137891988921058&w=2","http://www.mandriva.com/security/advisories?name=MDVSA-2013:113","https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0094","http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","https://exchange.xforce.ibmcloud.com/vulnerabilities/82598","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18771"]}]},"RPC-XML":{"advisories":[{"references":["https://metacpan.org/dist/RPC-XML/changes"],"affected_versions":["<0.45"],"id":"CPANSA-RPC-XML-2002-01","distribution":"RPC-XML","description":"A a potential security hole in the parsing of external entities.\n","reported":"2002-10-29","fixed_versions":[">=0.45"],"cves":[]}],"versions":[{"date":"2001-06-13T06:30:46","version":"0.25"},{"date":"2001-06-27T06:18:37","version":"0.26"},{"date":"2001-07-08T23:38:52","version":"0.27"},{"version":"0.28","date":"2001-10-08T05:10:22"},{"date":"2001-12-03T07:08:58","version":"0.29"},{"version":"0.30","date":"2002-01-03T09:49:30"},{"date":"2002-01-28T00:48:45","version":"0.35"},{"date":"2002-01-29T20:03:48","version":"0.36"},{"version":"0.37","date":"2002-03-23T06:39:00"},{"version":"0.40","date":"2002-05-04T07:56:19"},{"date":"2002-05-22T10:04:14","version":"0.41"},{"date":"2002-08-01T08:41:21","version":"0.42"},{"date":"2002-08-19T05:56:10","version":"0.43"},{"version":"0.44","date":"2002-08-31T06:58:58"},{"version":"0.45","date":"2002-10-30T05:15:04"},{"date":"2002-12-30T07:51:25","version":"0.46"},{"date":"2003-01-27T11:37:20","version":"0.50"},{"version":"0.51","date":"2003-01-30T09:36:24"},{"date":"2003-02-10T09:48:58","version":"0.52"},{"date":"2003-02-25T09:25:51","version":"0.53"},{"date":"2004-04-14T12:55:46","version":"0.54"},{"date":"2004-11-30T09:27:12","version":"0.55"},{"date":"2004-12-09T09:29:34","version":"0.56"},{"date":"2004-12-24T11:07:31","version":"0.57"},{"version":"0.58","date":"2005-05-12T10:47:19"},{"date":"2006-06-30T07:56:12","version":"0.59"},{"date":"2008-04-09T17:59:42","version":"0.60"},{"date":"2008-09-15T10:19:12","version":"0.61"},{"date":"2008-09-19T09:16:21","version":"0.62"},{"version":"0.63","date":"2008-09-19T09:28:08"},{"version":"0.64","date":"2008-09-29T11:24:26"},{"date":"2009-06-17T13:19:54","version":"0.65"},{"version":"0.66","date":"2009-07-09T14:42:56"},{"date":"2009-07-10T08:34:44","version":"0.67"},{"version":"0.69","date":"2009-09-03T17:37:20"},{"date":"2009-12-07T06:33:13","version":"0.70"},{"date":"2009-12-08T04:11:10","version":"0.71"},{"date":"2009-12-14T05:48:11","version":"0.72"},{"version":"0.73","date":"2010-03-17T05:55:29"},{"date":"2011-01-23T21:08:04","version":"0.74"},{"version":"0.75","date":"2011-08-14T00:40:40"},{"date":"2011-08-21T19:48:16","version":"0.76"},{"date":"2012-09-03T18:58:22","version":"0.77"},{"date":"2014-02-07T04:15:00","version":"0.78"},{"date":"2015-05-01T16:02:19","version":"0.79"},{"date":"2016-05-08T20:17:31","version":"0.80"},{"version":"0.81","date":"2021-01-06T02:49:51"},{"date":"2021-01-06T18:05:35","version":"0.82"}],"main_module":"RPC::XML"},"Jifty-DBI":{"advisories":[{"references":["https://metacpan.org/dist/Jifty-DBI/changes","https://metacpan.org/dist/Jifty/changes"],"affected_versions":["<0.68"],"id":"CPANSA-Jifty-DBI-2011-01","fixed_versions":[">=0.68"],"reported":"2011-04-04","cves":[],"distribution":"Jifty-DBI","description":"SQL injection in column names, operators, order and group by.\n"}],"main_module":"Jifty::DBI","versions":[{"date":"2005-11-08T21:32:52","version":"0.02"},{"version":"0.05_01","date":"2005-11-26T07:21:20"},{"date":"2005-12-23T20:48:59","version":"0.06"},{"version":"0.06","date":"2005-12-24T04:29:10"},{"date":"2005-12-25T19:37:31","version":"0.08"},{"version":"0.09","date":"2005-12-29T13:31:40"},{"version":"0.10","date":"2006-01-08T10:05:05"},{"version":"0.11","date":"2006-01-15T17:22:14"},{"date":"2006-03-05T01:55:32","version":"0.15"},{"date":"2006-03-05T02:07:03","version":"0.15"},{"date":"2006-03-31T13:22:16","version":"0.18"},{"version":"0.19","date":"2006-04-02T10:05:36"},{"version":"0.20","date":"2006-04-21T16:27:47"},{"date":"2006-05-03T18:26:47","version":"0.20"},{"date":"2006-06-15T12:17:00","version":"0.21"},{"version":"0.25","date":"2006-09-12T22:56:59"},{"date":"2006-11-13T16:15:30","version":"0.25"},{"date":"2006-11-24T03:15:46","version":"0.25"},{"version":"0.25","date":"2007-01-17T20:34:50"},{"version":"0.31","date":"2007-01-26T11:55:26"},{"date":"2007-01-26T12:22:07","version":"0.39_99"},{"version":"0.32","date":"2007-01-26T12:56:35"},{"version":"0.39_999","date":"2007-01-26T13:34:03"},{"version":"0.32","date":"2007-01-28T13:30:21"},{"version":"0.39_9999","date":"2007-04-15T15:26:52"},{"version":"0.41","date":"2007-04-16T20:21:33"},{"version":"0.43","date":"2007-08-24T04:20:36"},{"date":"2007-10-26T16:48:22","version":"0.43"},{"date":"2007-11-07T17:27:17","version":"0.46"},{"version":"0.46","date":"2007-11-16T21:28:33"},{"date":"2007-11-29T21:38:34","version":"0.46"},{"date":"2008-04-08T03:05:48","version":"0.49"},{"date":"2009-03-25T19:32:29","version":"0.53"},{"version":"0.53","date":"2009-05-19T12:33:45"},{"date":"2009-07-14T07:29:33","version":"0.53"},{"date":"2009-11-19T01:16:21","version":"0.59"},{"date":"2010-01-04T18:04:58","version":"0.60"},{"date":"2010-12-08T20:15:10","version":"0.63"},{"date":"2010-12-08T20:24:47","version":"0.64"},{"date":"2011-02-14T21:27:51","version":"0.66"},{"version":"0.67","date":"2011-02-28T16:00:37"},{"date":"2011-04-14T16:20:25","version":"0.68"},{"date":"2011-05-17T19:54:33","version":"0.69"},{"version":"0.70","date":"2011-06-15T20:46:39"},{"date":"2011-06-17T20:39:50","version":"0.71"},{"date":"2011-10-17T16:45:06","version":"0.72"},{"date":"2012-01-25T21:39:16","version":"0.73"},{"date":"2012-01-25T21:45:14","version":"0.74"},{"date":"2013-01-29T20:18:33","version":"0.75"},{"date":"2013-06-17T22:14:37","version":"0.76"},{"date":"2013-12-01T18:11:35","version":"0.77"},{"version":"0.78","date":"2015-04-30T19:16:36"}]},"GD":{"main_module":"GD","versions":[{"version":"1.00","date":"1996-05-17T08:12:00"},{"date":"1996-07-17T10:16:00","version":"1.01"},{"version":"1.10","date":"1996-09-07T16:53:00"},{"date":"1996-09-09T10:37:00","version":"1.11"},{"version":"1.12","date":"1996-09-10T12:04:00"},{"version":"1.13","date":"1996-09-11T07:27:00"},{"version":"1.14","date":"1996-09-12T16:11:00"},{"date":"1997-11-19T21:13:00","version":"1.15"},{"version":"1.16","date":"1997-12-19T14:26:00"},{"version":"1.17","date":"1998-01-16T13:34:00"},{"date":"1998-01-26T08:44:00","version":"1.18"},{"version":"1.18","date":"1998-03-08T16:43:26"},{"date":"1999-01-31T17:52:34","version":"1.18"},{"date":"1999-04-26T20:35:55","version":"1.19"},{"date":"1999-06-02T13:44:43","version":"1.19"},{"version":"1.20","date":"1999-08-31T03:38:46"},{"version":"1.21","date":"1999-08-31T14:55:24"},{"version":"1.22","date":"1999-09-30T21:46:47"},{"version":"1.23","date":"1999-11-11T14:26:14"},{"date":"2000-02-15T19:54:37","version":"1.24"},{"date":"2000-02-22T15:20:41","version":"1.25"},{"date":"2000-03-18T23:21:50","version":"1.26"},{"date":"2000-03-22T19:41:56","version":"1.27"},{"version":"1.28","date":"2000-06-23T12:15:51"},{"version":"1.29","date":"2000-06-23T18:26:31"},{"version":"1.30","date":"2000-07-07T02:42:47"},{"date":"2000-11-10T16:00:09","version":"1.32"},{"version":"1.33","date":"2001-04-05T04:42:53"},{"version":"1.31","date":"2001-09-26T05:19:41"},{"date":"2001-12-06T22:57:11","version":"1.35"},{"version":"1.36","date":"2001-12-17T19:13:23"},{"date":"2001-12-19T21:34:33","version":"1.37"},{"version":"1.38","date":"2002-01-04T15:33:18"},{"date":"2002-06-12T02:09:05","version":"1.39"},{"version":"1.40","date":"2002-06-19T12:11:07"},{"version":"1.41","date":"2002-07-22T07:33:14"},{"date":"2002-08-09T16:31:00","version":"2.00"},{"date":"2002-08-09T16:39:49","version":"2.01"},{"date":"2002-10-14T13:07:59","version":"2.02"},{"version":"2.04","date":"2002-11-01T15:46:28"},{"version":"2.041","date":"2002-11-05T00:55:52"},{"date":"2002-11-25T01:35:10","version":"2.05"},{"date":"2003-01-08T16:49:15","version":"2.06"},{"version":"2.07","date":"2003-04-24T05:06:33"},{"version":"2.10","date":"2003-10-06T23:04:15"},{"version":"2.11","date":"2003-10-07T22:33:21"},{"date":"2004-02-06T14:33:56","version":"2.12"},{"version":"2.15","date":"2004-07-22T20:32:01"},{"date":"2004-07-27T00:47:05","version":"2.16"},{"version":"2.17","date":"2004-11-10T19:15:39"},{"date":"2004-11-12T15:19:40","version":"2.18"},{"date":"2004-11-16T13:36:22","version":"2.19"},{"version":"2.21","date":"2005-02-09T18:50:44"},{"date":"2005-03-07T18:09:39","version":"2.22"},{"version":"2.23","date":"2005-03-09T21:04:40"},{"date":"2005-07-15T18:47:39","version":"2.25"},{"version":"2.26","date":"2005-08-04T13:34:01"},{"version":"2.27","date":"2005-08-06T14:52:27"},{"version":"2.28","date":"2005-08-08T17:28:37"},{"date":"2005-10-19T05:44:52","version":"2.29"},{"date":"2005-10-19T07:51:48","version":"2.30"},{"version":"2.31","date":"2006-02-20T19:48:20"},{"date":"2006-03-08T20:19:06","version":"2.32"},{"version":"2.34","date":"2006-06-01T20:02:57"},{"version":"2.35","date":"2006-08-23T15:31:17"},{"date":"2008-04-21T14:15:26","version":"2.39"},{"version":"2.40","date":"2008-08-07T18:48:46"},{"version":"2.41","date":"2008-08-07T19:17:19"},{"version":"2.43","date":"2009-06-10T14:44:33"},{"version":"2.44","date":"2009-07-10T18:12:58"},{"date":"2010-04-30T18:52:21","version":"2.45"},{"date":"2011-05-01T17:47:22","version":"2.46"},{"date":"2013-02-26T10:54:32","version":"2.48"},{"version":"2.49","date":"2013-02-26T11:04:16"},{"version":"2.50","date":"2013-07-02T20:48:59"},{"date":"2014-02-04T16:53:54","version":"2.51"},{"version":"2.52","date":"2014-02-19T04:29:23"},{"version":"2.53","date":"2014-04-01T14:26:31"},{"date":"2014-10-27T02:29:14","version":"2.55"},{"version":"2.56","date":"2014-10-28T01:35:39"},{"version":"2.56_01","date":"2017-04-19T14:45:56"},{"version":"2.56_02","date":"2017-04-19T14:56:35"},{"version":"2.56_03","date":"2017-04-19T15:19:33"},{"version":"2.57","date":"2017-04-21T06:22:54"},{"date":"2017-04-21T08:38:24","version":"2.58"},{"version":"2.59","date":"2017-04-21T10:35:21"},{"version":"2.60","date":"2017-04-21T22:11:18"},{"version":"2.61","date":"2017-04-22T15:52:15"},{"date":"2017-04-22T22:27:02","version":"2.62"},{"date":"2017-04-23T08:23:06","version":"2.63"},{"version":"2.64","date":"2017-04-23T09:03:18"},{"date":"2017-04-23T10:36:23","version":"2.65"},{"date":"2017-04-23T13:08:08","version":"2.66"},{"date":"2017-11-15T08:33:16","version":"2.67"},{"version":"2.68","date":"2018-02-18T19:56:41"},{"version":"2.69","date":"2018-08-26T15:40:02"},{"version":"2.70","date":"2019-01-10T12:57:08"},{"date":"2019-02-12T11:53:42","version":"2.71"},{"date":"2020-07-18T06:02:50","version":"2.72"},{"version":"2.73","date":"2020-09-24T13:01:57"},{"version":"2.74","date":"2022-01-23T15:34:48"},{"version":"2.75","date":"2022-01-25T16:54:22"},{"date":"2022-02-01T14:50:45","version":"2.76"},{"version":"2.77","date":"2023-05-29T07:10:47"},{"version":"2.78","date":"2023-07-04T09:13:52"},{"version":"2.79","date":"2024-04-29T19:57:07"},{"version":"2.80","date":"2024-05-03T11:16:48"},{"date":"2024-05-03T17:02:57","version":"2.81"},{"version":"2.82","date":"2024-05-27T10:31:38"},{"version":"2.83","date":"2024-06-23T15:46:01"}],"advisories":[{"id":"CPANSA-GD-2019-6977","distribution":"GD","description":"gdImageColorMatch in gd_color_match.c in the GD Graphics Library (aka LibGD) 2.2.5, as used in the imagecolormatch function in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1, has a heap-based buffer overflow. This can be exploited by an attacker who is able to trigger imagecolormatch calls with crafted image data.\n","reported":"2019-01-27","fixed_versions":[">=2.72"],"cves":["CVE-2019-6977"],"severity":"high","references":["https://nvd.nist.gov/vuln/detail/CVE-2019-6977","https://bugs.php.net/bug.php?id=77270","http://php.net/ChangeLog-7.php","http://php.net/ChangeLog-5.php","http://www.securityfocus.com/bid/106731","https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html","https://www.debian.org/security/2019/dsa-4384","https://usn.ubuntu.com/3900-1/","https://security.netapp.com/advisory/ntap-20190315-0003/","https://security.gentoo.org/glsa/201903-18","http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html","http://packetstormsecurity.com/files/152459/PHP-7.2-imagecolormatch-Out-Of-Band-Heap-Write.html","https://www.exploit-db.com/exploits/46677/","https://access.redhat.com/errata/RHSA-2019:2519","https://access.redhat.com/errata/RHSA-2019:3299","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEYUUOW75YD3DENIPYMO263E6NL2NFHI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3WRUPZVT2MWFUEMVGTRAGDOBHLNMGK5R/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TTXSLRZI5BCQT3H5KALG3DHUWUMNPDX2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/"],"affected_versions":["<2.72"]}]},"File-Slurp":{"advisories":[{"references":["https://rt.cpan.org/Public/Bug/Display.html?id=83126","https://rt.perl.org/Ticket/Display.html?id=121870"],"affected_versions":["<9999.26"],"id":"CPANSA-File-Slurp-2013-01","fixed_versions":[">=9999.26"],"reported":"2013-02-04","cves":[],"description":"Use of sysread treats any :encoding(...) as effectively :utf8.\n","distribution":"File-Slurp"}],"main_module":"File::Slurp","versions":[{"date":"1996-04-22T21:18:00","version":"96.042202"},{"date":"1998-07-19T16:25:00","version":"98.071901"},{"version":"2001.1103","date":"2001-11-04T03:17:00"},{"version":"2002.0305","date":"2002-03-08T05:22:00"},{"date":"2002-11-01T03:14:00","version":"2002.1031"},{"version":"2004.0904","date":"2003-09-04T16:28:00"},{"date":"2003-11-24T07:45:57","version":"0.01"},{"version":"9999.01","date":"2003-11-24T08:02:47"},{"date":"2003-12-17T09:20:57","version":"9999.02"},{"date":"2003-12-22T06:54:57","version":"9999.03"},{"date":"2004-02-23T19:27:53","version":"9999.04"},{"date":"2004-09-21T05:23:58","version":"9999.06"},{"date":"2005-01-30T10:01:07","version":"9999.07"},{"version":"9999.08","date":"2005-04-16T05:06:09"},{"date":"2005-04-29T06:09:11","version":"9999.09"},{"date":"2006-01-19T18:29:42","version":"9999.10"},{"version":"9999.11","date":"2006-01-20T06:45:13"},{"version":"9999.12","date":"2006-03-07T07:13:42"},{"version":"9999.13","date":"2008-01-24T04:57:12"},{"date":"2011-03-22T22:41:08","version":"9999.14"},{"date":"2011-03-24T22:52:42","version":"9999.15"},{"version":"9999.16","date":"2011-04-24T04:26:18"},{"version":"9999.17","date":"2011-05-13T06:23:08"},{"date":"2011-05-13T07:03:44","version":"9999.18"},{"version":"9999.19","date":"2011-06-07T08:08:06"},{"version":"9999.20_01","date":"2018-09-28T01:57:50"},{"version":"9999.20_02","date":"2018-10-05T01:23:09"},{"date":"2018-10-08T21:16:27","version":"9999.21"},{"version":"9999.22","date":"2018-10-16T03:15:39"},{"date":"2018-10-20T20:06:53","version":"9999.23"},{"date":"2018-10-30T02:45:09","version":"9999.24"},{"version":"9999.25","date":"2018-11-16T16:11:34"},{"version":"9999.26","date":"2019-02-13T16:35:40"},{"version":"9999.27","date":"2019-04-05T13:28:05"},{"version":"9999.28","date":"2019-09-13T00:36:22"},{"date":"2019-11-27T20:40:47","version":"9999.29"},{"version":"9999.30","date":"2020-03-09T14:31:40"},{"date":"2020-06-28T22:33:21","version":"9999.31"},{"version":"9999.32","date":"2020-07-01T00:34:08"}]},"CGI-Simple":{"main_module":"CGI::Simple","versions":[{"date":"2007-01-09T22:31:27","version":"0.078"},{"version":"0.079","date":"2007-02-23T16:22:19"},{"date":"2007-03-30T20:15:35","version":"0.080"},{"version":"0.081","date":"2007-05-20T19:19:40"},{"version":"0.082","date":"2007-05-22T18:43:01"},{"version":"0.83","date":"2007-05-22T18:54:06"},{"date":"2007-05-24T03:15:01","version":"1.0"},{"date":"2007-07-13T18:58:16","version":"1.1"},{"version":"1.1.1","date":"2007-07-31T01:57:01"},{"date":"2007-07-31T02:04:25","version":"1.1.2"},{"version":"1.103","date":"2007-07-31T02:10:47"},{"date":"2008-05-13T15:46:18","version":"1.104"},{"version":"1.105","date":"2008-05-16T14:37:31"},{"version":"1.106","date":"2008-09-14T13:29:51"},{"date":"2009-03-07T21:24:59","version":"1.107"},{"version":"1.108","date":"2009-03-13T14:06:24"},{"date":"2009-04-16T17:54:13","version":"1.109"},{"date":"2009-05-24T21:25:22","version":"1.110"},{"version":"1.111","date":"2009-05-28T18:02:08"},{"version":"1.112","date":"2009-05-31T10:43:56"},{"date":"2010-12-27T13:11:56","version":"1.113"},{"date":"2014-10-19T12:53:24","version":"1.115"},{"version":"1.13","date":"2018-03-01T15:09:42"},{"version":"1.14","date":"2018-03-03T10:42:06"},{"version":"1.15","date":"2018-03-04T03:42:20"},{"version":"1.16","date":"2018-07-25T15:17:39"},{"date":"2018-10-02T09:48:08","version":"1.17"},{"version":"1.18","date":"2018-10-03T14:21:12"},{"date":"2018-10-04T12:05:58","version":"1.19"},{"date":"2018-10-05T11:30:05","version":"1.20"},{"version":"1.21","date":"2018-10-06T07:21:31"},{"date":"2019-09-07T04:28:17","version":"1.22"},{"date":"2020-02-06T06:12:09","version":"1.23"},{"version":"1.24","date":"2020-02-07T11:11:56"},{"version":"1.25","date":"2020-02-10T13:00:54"},{"version":"1.26","date":"2022-01-02T18:00:56"},{"date":"2022-01-06T16:00:18","version":"1.27"},{"version":"1.280","date":"2022-01-11T15:16:20"},{"date":"2024-01-31T14:19:02","version":"1.281"}],"advisories":[{"references":["https://metacpan.org/changes/distribution/CGI-Simple"],"affected_versions":["<1.113"],"id":"CPANSA-CGI-Simple-2010-02","distribution":"CGI-Simple","description":"Newlines in headers, which could lead to header injection attacks.\n","fixed_versions":[">=1.113"],"reported":"2010-12-27","cves":["CVE-2010-4410"]},{"affected_versions":["<1.113"],"references":["https://metacpan.org/changes/distribution/CGI-Simple"],"reported":"2010-12-27","cves":[],"fixed_versions":[">=1.113"],"distribution":"CGI-Simple","description":"Non-random multipart boundary.\n","id":"CPANSA-CGI-Simple-2010-01"},{"description":"The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.\n","distribution":"CGI-Simple","fixed_versions":[],"reported":"2010-12-06","cves":["CVE-2010-2761"],"id":"CPANSA-CGI-Simple-2010-2761","references":["https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380","http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes","http://openwall.com/lists/oss-security/2010/12/01/1","http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html","http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm","http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1","http://openwall.com/lists/oss-security/2010/12/01/2","http://openwall.com/lists/oss-security/2010/12/01/3","https://bugzilla.mozilla.org/show_bug.cgi?id=600464","http://osvdb.org/69588","http://osvdb.org/69589","http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html","http://www.mandriva.com/security/advisories?name=MDVSA-2010:237","http://www.vupen.com/english/advisories/2011/0076","http://www.mandriva.com/security/advisories?name=MDVSA-2010:250","http://secunia.com/advisories/42877","https://bugzilla.mozilla.org/show_bug.cgi?id=591165","http://www.vupen.com/english/advisories/2011/0207","http://www.bugzilla.org/security/3.2.9/","http://secunia.com/advisories/43033","http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053591.html","http://secunia.com/advisories/43147","http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053576.html","http://www.vupen.com/english/advisories/2011/0249","http://www.vupen.com/english/advisories/2011/0271","http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html","http://www.vupen.com/english/advisories/2011/0212","http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html","http://secunia.com/advisories/43165","http://secunia.com/advisories/43068","http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html","http://www.redhat.com/support/errata/RHSA-2011-1797.html","http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"],"affected_versions":["<=1.112"],"severity":null}]},"Galileo":{"advisories":[{"id":"CPANSA-Galileo-2019-7410","distribution":"Galileo","description":"There is stored cross site scripting (XSS) in Galileo CMS v0.042. Remote authenticated users could inject arbitrary web script or HTML via $page_title in /lib/Galileo/files/templates/page/show.html.ep (aka the PAGE TITLE Field).\n","fixed_versions":[">=0.043"],"reported":"2020-08-14","cves":["CVE-2019-7410"],"severity":"medium","references":["https://metamorfosec.com/Files/Commits/METC-2020-002-Escape_banner_in_Galileo_CMS_v0.042.txt","https://metacpan.org/changes/distribution/Galileo","https://github.com/jberger/Galileo/pull/55/files","https://metamorfosec.com/Files/Advisories/METS-2020-002-A_Stored_XSS_Vulnerability_in_Galileo_CMS_v0.042.txt"],"affected_versions":["<0.043"]}],"main_module":"Galileo","versions":[{"date":"2012-07-30T17:03:42","version":"0.001"},{"date":"2012-07-30T17:38:19","version":"0.002"},{"date":"2012-07-30T20:36:06","version":"0.003"},{"date":"2012-07-31T15:41:59","version":"0.004"},{"date":"2012-08-06T21:26:17","version":"0.005"},{"version":"0.006","date":"2012-08-09T20:39:14"},{"version":"0.007","date":"2012-09-10T17:57:20"},{"version":"0.008","date":"2012-10-27T17:40:15"},{"version":"0.009","date":"2012-10-28T18:03:00"},{"version":"0.01","date":"2012-10-28T18:10:15"},{"date":"2012-10-31T22:10:19","version":"0.011"},{"version":"0.012","date":"2013-01-15T15:10:42"},{"date":"2013-01-15T21:07:00","version":"0.013"},{"date":"2013-01-16T21:37:32","version":"0.014"},{"version":"0.015","date":"2013-01-19T03:59:45"},{"date":"2013-01-26T21:28:59","version":"0.016"},{"date":"2013-02-05T03:32:32","version":"0.017"},{"version":"0.018","date":"2013-02-06T02:47:47"},{"version":"0.019","date":"2013-02-06T03:09:27"},{"date":"2013-02-11T23:33:00","version":"0.020"},{"date":"2013-02-17T01:24:51","version":"0.021"},{"date":"2013-02-17T02:44:14","version":"0.022"},{"date":"2013-03-04T18:25:01","version":"0.023"},{"date":"2013-03-12T15:24:22","version":"0.024"},{"version":"0.025","date":"2013-03-12T18:48:22"},{"date":"2013-03-15T15:18:18","version":"0.026"},{"version":"0.027","date":"2013-04-03T20:04:15"},{"date":"2013-05-14T15:59:46","version":"0.028"},{"date":"2013-06-29T03:30:18","version":"0.029"},{"version":"0.030","date":"2013-08-27T03:43:39"},{"version":"0.031","date":"2013-11-28T18:36:10"},{"version":"0.032","date":"2014-04-06T16:17:22"},{"date":"2014-05-10T19:38:50","version":"0.033"},{"version":"0.034","date":"2014-05-31T13:06:42"},{"version":"0.035","date":"2014-08-16T22:10:46"},{"version":"0.036","date":"2014-08-31T15:31:15"},{"date":"2014-10-14T04:03:53","version":"0.037"},{"date":"2015-01-25T18:08:54","version":"0.038"},{"version":"0.039","date":"2015-09-28T18:25:31"},{"version":"0.040","date":"2016-01-07T16:33:46"},{"version":"0.041","date":"2016-08-13T18:15:17"},{"date":"2017-03-16T03:14:04","version":"0.042"},{"date":"2020-08-06T16:26:58","version":"0.043"}]},"Fake-Our":{"advisories":[{"reported":"2017-01-23","fixed_versions":[">=0.06"],"cves":["CVE-2016-1238"],"distribution":"Fake-Our","description":"Loading modules from . (current directory).\n","id":"CPANSA-Fake-Our-2017-01","references":["https://metacpan.org/changes/distribution/Fake-Our"],"affected_versions":["<0.06"]}],"main_module":"Fake::Our","versions":[{"version":"0.01","date":"2014-02-09T05:36:09"},{"date":"2014-08-06T17:33:15","version":"0.02"},{"date":"2014-08-09T02:35:25","version":"0.03"},{"date":"2014-08-10T15:33:58","version":"0.04"},{"date":"2015-06-21T04:09:47","version":"0.05"},{"date":"2017-01-23T12:34:34","version":"0.06"},{"version":"0.07","date":"2017-01-26T15:21:45"},{"date":"2017-01-27T15:18:56","version":"0.08"},{"version":"0.09","date":"2017-01-28T15:07:50"},{"version":"0.10","date":"2017-03-06T16:01:51"},{"date":"2018-02-03T11:05:49","version":"0.11"},{"date":"2018-02-16T17:54:00","version":"0.12"},{"version":"0.13","date":"2018-02-17T01:35:58"},{"version":"0.14","date":"2018-02-18T15:32:17"},{"date":"2019-07-11T16:27:42","version":"0.15"},{"version":"0.16","date":"2019-07-14T00:51:24"},{"date":"2023-03-25T02:32:44","version":"0.17"}]},"Amon2-Auth-Site-LINE":{"advisories":[{"affected_versions":["<0.05"],"references":["https://metacpan.org/release/SHLOMIF/String-Random-0.32/source/lib/String/Random.pm#L377","https://metacpan.org/release/TANIGUCHI/Amon2-Auth-Site-LINE-0.04/source/lib/Amon2/Auth/Site/LINE.pm#L235","https://metacpan.org/release/TANIGUCHI/Amon2-Auth-Site-LINE-0.04/source/lib/Amon2/Auth/Site/LINE.pm#L255","https://security.metacpan.org/docs/guides/random-data-for-security.html","https://jvndb.jvn.jp/ja/contents/2025/JVNDB-2025-003449.html"],"severity":"moderate","description":"Amon2::Auth::Site::LINE uses the String::Random module to generate nonce values.  String::Random defaults to Perl's built-in predictable random number generator, the rand() function, which is not cryptographically secure","distribution":"Amon2-Auth-Site-LINE","fixed_versions":[">=0.05"],"reported":"2025-04-05","cves":["CVE-2024-57835"],"id":"CPANSA-Amon2-Auth-Site-LINE-2024-57835"}],"main_module":"Amon2::Auth::Site::LINE","versions":[{"date":"2020-11-21T06:34:32","version":"0.01"},{"date":"2020-11-23T00:05:03","version":"0.02"},{"version":"0.03","date":"2020-11-25T01:33:35"},{"date":"2020-11-26T07:04:40","version":"0.04"},{"date":"2025-05-20T12:14:56","version":"0.05"}]},"libapreq2":{"main_module":"Apache2::Cookie","versions":[{"date":"2003-11-11T01:28:48","version":"2.01_03"},{"date":"2003-11-16T04:16:12","version":"2.02_02"},{"version":"2.03_04","date":"2004-06-12T14:52:49"},{"version":"2.04_03","date":"2004-08-30T16:13:45"},{"date":"2005-05-04T23:38:05","version":"2.05"},{"version":"2.06","date":"2005-07-20T17:10:48"},{"date":"2006-02-12T18:10:47","version":"2.07"},{"date":"2006-08-09T04:54:07","version":"2.08"},{"version":"2.12","date":"2009-03-13T22:47:11"},{"date":"2010-12-02T18:41:57","version":"2.13"},{"date":"2021-02-23T13:26:47","version":"2.15"},{"date":"2021-03-22T17:59:11","version":"2.16"}],"advisories":[{"id":"CPANSA-libapreq2-2006-01","description":"Unspecified vulnerability in apreq_parse_headers and apreq_parse_urlencoded functions in Apache2::Request (Libapreq2) allows remote attackers to cause a denial of service (CPU consumption) via unknown attack vectors that result in quadratic computational complexity.\n","distribution":"libapreq2","reported":"2007-04-17","fixed_versions":[">=2.07"],"cves":["CVE-2006-0042"],"references":["https://metacpan.org/changes/distribution/libapreq2"],"affected_versions":["<2.07"]}]},"Net-OpenID-Consumer":{"versions":[{"version":"0.02","date":"2005-05-23T03:02:59"},{"date":"2005-05-23T08:05:35","version":"0.03"},{"version":"0.04","date":"2005-05-25T05:08:25"},{"version":"0.05","date":"2005-05-25T06:14:44"},{"date":"2005-05-26T06:18:39","version":"0.06"},{"date":"2005-05-26T06:56:30","version":"0.07"},{"version":"0.08","date":"2005-05-26T07:18:01"},{"version":"0.09","date":"2005-06-23T23:50:47"},{"date":"2005-06-27T04:43:01","version":"0.10"},{"version":"0.11","date":"2005-06-27T21:59:47"},{"date":"2005-07-13T17:57:27","version":"0.12"},{"date":"2007-04-16T17:58:45","version":"0.13"},{"version":"0.14","date":"2007-08-03T22:07:20"},{"version":"1.01","date":"2008-10-13T02:30:05"},{"date":"2008-10-14T04:39:07","version":"1.02"},{"version":"1.03","date":"2008-11-30T02:02:17"},{"date":"2010-02-18T15:32:06","version":"1.04"},{"date":"2010-02-18T16:01:19","version":"1.05"},{"date":"2010-03-16T17:38:56","version":"1.06"},{"version":"1.030099_001","date":"2010-11-06T02:24:29"},{"date":"2010-11-07T11:21:33","version":"1.030099_002"},{"version":"1.030099_003","date":"2010-11-08T22:35:52"},{"version":"1.030099_004","date":"2010-12-17T21:57:03"},{"date":"2011-01-01T01:55:09","version":"1.030099_005"},{"date":"2011-10-23T01:35:49","version":"1.030099_006"},{"version":"1.100099_001","date":"2011-10-25T23:10:00"},{"date":"2011-11-02T10:38:05","version":"1.100099_002"},{"version":"1.11","date":"2011-11-04T23:01:32"},{"date":"2011-11-07T17:16:08","version":"1.12"},{"date":"2011-11-15T03:28:36","version":"1.13"},{"version":"1.14","date":"2013-04-01T13:17:57"},{"version":"1.15","date":"2013-09-06T23:47:04"},{"version":"1.16","date":"2014-09-15T21:38:12"},{"version":"1.17","date":"2016-01-15T11:45:55"},{"date":"2016-02-08T01:40:13","version":"1.18"}],"main_module":"Net::OpenID::Consumer","advisories":[{"references":["https://metacpan.org/changes/distribution/Net-OpenID-Consumer","https://github.com/wrog/Net-OpenID-Consumer/commit/4e82c7e4b6ad4bc40571c5cfcaa58f9365b147a5","http://lists.openid.net/pipermail/openid-security/2010-July/001156.html"],"affected_versions":["<1.12"],"id":"CPANSA-Net-OpenID-Consumer-2010-01","distribution":"Net-OpenID-Consumer","description":"A potential timing attack when checking signatures.\n","reported":"2010-11-06","fixed_versions":[">=1.12"],"cves":[]},{"distribution":"Net-OpenID-Consumer","description":"Incorrect comparison of system openssl status when doing DSA checks.\n","fixed_versions":[">=0.06"],"reported":"2015-05-26","cves":[],"id":"CPANSA-Net-OpenID-Consumer-2015-05","references":["https://metacpan.org/changes/distribution/Net-OpenID-Consumer"],"affected_versions":["<0.06"]}]},"Cmd-Dwarf":{"versions":[{"version":"1.27","date":"2015-07-30T06:48:35"},{"version":"1.28","date":"2015-08-26T13:27:51"},{"date":"2015-08-28T08:58:33","version":"1.29"},{"date":"2015-09-17T08:17:32","version":"1.30"},{"date":"2016-01-20T06:39:15","version":"1.31"},{"version":"1.41","date":"2016-10-25T05:56:33"},{"version":"1.42","date":"2017-03-29T04:42:05"},{"date":"2017-06-21T07:06:05","version":"1.50"},{"version":"1.60","date":"2017-10-05T08:08:01"},{"date":"2018-03-17T07:35:19","version":"1.70"},{"version":"1.80","date":"2018-08-18T11:43:10"},{"date":"2019-04-05T05:22:33","version":"1.81"},{"date":"2019-04-05T05:36:46","version":"1.82"},{"date":"2019-04-05T09:06:55","version":"1.83"}],"main_module":"Cmd::Dwarf","advisories":[{"references":["https://github.com/seagirl/dwarf/commit/14cf7a1d55db635a07f4838e16f3d9a28e63f529","https://metacpan.org/changes/distribution/Cmd-Dwarf"],"affected_versions":["<1.20"],"id":"CPANSA-Cmd-Dwarf-2014-01","distribution":"Cmd-Dwarf","description":"JSON highjacking possibility.\n","reported":"2014-12-03","cves":[],"fixed_versions":[">=1.20"]}]},"Module-ScanDeps":{"advisories":[{"references":["https://github.com/rschupp/Module-ScanDeps/security/advisories/GHSA-g597-359q-v529","https://www.cve.org/CVERecord?id=CVE-2024-10224","https://www.qualys.com/2024/11/19/needrestart/needrestart.txt","https://lists.debian.org/debian-lts-announce/2024/11/msg00015.html","https://ubuntu.com/security/CVE-2024-10224"],"affected_versions":["<1.36"],"severity":null,"cves":["CVE-2024-10224"],"reported":"2024-11-19","fixed_versions":[">=1.36"],"description":"Qualys discovered that if unsanitized input was used with the library Modules::ScanDeps, before version 1.36 a local attacker could possibly execute arbitrary shell commands by open()ing a \"pesky pipe\" (such as passing \"commands|\" as a filename) or by passing arbitrary strings to eval().\n","distribution":"Module-ScanDeps","id":"CPANSA-Module-ScanDeps-2024-10224"}],"versions":[{"date":"2002-11-02T02:07:07","version":"0.01"},{"version":"0.02","date":"2002-11-02T15:56:27"},{"version":"0.03","date":"2002-11-03T19:51:24"},{"date":"2002-11-04T12:01:46","version":"0.10"},{"date":"2003-01-18T19:35:58","version":"0.12"},{"date":"2003-01-18T21:08:58","version":"0.13"},{"version":"0.14","date":"2003-01-19T15:48:47"},{"date":"2003-02-25T03:23:37","version":"0.17"},{"date":"2003-03-20T11:59:13","version":"0.18"},{"version":"0.19","date":"2003-03-22T13:20:27"},{"version":"0.20","date":"2003-07-30T14:59:45"},{"version":"0.21","date":"2003-07-30T15:18:11"},{"version":"0.22","date":"2003-08-07T18:41:51"},{"version":"0.23","date":"2003-08-08T10:19:27"},{"version":"0.24","date":"2003-08-10T05:43:06"},{"date":"2003-08-10T15:46:55","version":"0.25"},{"date":"2003-08-16T04:48:20","version":"0.27"},{"date":"2003-08-17T19:03:59","version":"0.28"},{"version":"0.29","date":"2003-09-17T09:18:20"},{"version":"0.30","date":"2003-09-20T20:36:32"},{"date":"2003-10-17T22:37:35","version":"0.31"},{"version":"0.32","date":"2003-10-26T10:53:58"},{"version":"0.33","date":"2003-12-21T01:21:51"},{"date":"2003-12-30T02:36:30","version":"0.34"},{"version":"0.35","date":"2003-12-31T12:02:59"},{"date":"2003-12-31T15:33:07","version":"0.37"},{"version":"0.38","date":"2004-01-08T11:38:10"},{"version":"0.39","date":"2004-01-25T16:28:12"},{"version":"0.40","date":"2004-02-23T21:14:41"},{"version":"0.41","date":"2004-04-18T16:05:29"},{"version":"0.42","date":"2004-04-30T20:02:44"},{"version":"0.43","date":"2004-06-02T18:05:32"},{"version":"0.44","date":"2004-06-08T19:06:29"},{"version":"0.45","date":"2004-06-30T08:03:18"},{"date":"2004-07-02T10:35:16","version":"0.46"},{"date":"2004-08-30T22:13:57","version":"0.47"},{"date":"2004-09-06T20:56:31","version":"0.48"},{"date":"2004-09-26T17:45:11","version":"0.49"},{"version":"0.50","date":"2004-10-03T17:31:23"},{"date":"2005-01-07T20:57:46","version":"0.51"},{"version":"0.52","date":"2005-12-12T12:05:41"},{"date":"2006-01-09T18:07:40","version":"0.53"},{"date":"2006-01-11T03:19:40","version":"0.54"},{"version":"0.55","date":"2006-02-17T16:39:23"},{"version":"0.56","date":"2006-02-20T15:38:03"},{"version":"0.57","date":"2006-03-03T19:30:56"},{"version":"0.58","date":"2006-04-16T14:54:53"},{"date":"2006-05-03T09:13:49","version":"0.59"},{"date":"2006-05-23T15:29:09","version":"0.60"},{"date":"2006-06-30T19:12:26","version":"0.61"},{"date":"2006-07-16T09:25:37","version":"0.62"},{"date":"2006-08-27T17:26:32","version":"0.63"},{"date":"2006-09-23T07:46:41","version":"0.64"},{"date":"2006-09-24T07:59:07","version":"0.64"},{"version":"0.66","date":"2006-09-24T09:03:21"},{"version":"0.67","date":"2006-10-24T16:12:59"},{"version":"0.68","date":"2006-10-25T19:08:27"},{"date":"2006-11-07T18:16:07","version":"0.69"},{"date":"2006-11-21T11:00:52","version":"0.70"},{"version":"0.71","date":"2007-01-04T19:28:34"},{"version":"0.72","date":"2007-02-03T10:40:10"},{"version":"0.73","date":"2007-03-25T18:35:04"},{"date":"2007-04-14T09:17:51","version":"0.73_01"},{"date":"2007-04-30T18:45:05","version":"0.74"},{"date":"2007-06-24T17:25:22","version":"0.75"},{"date":"2007-07-21T15:40:54","version":"0.76"},{"date":"2007-09-20T17:42:07","version":"0.77"},{"version":"0.78","date":"2007-11-17T04:18:23"},{"version":"0.80","date":"2007-11-30T21:08:01"},{"version":"0.81","date":"2007-12-07T13:24:35"},{"date":"2008-01-28T16:33:27","version":"0.82"},{"date":"2008-03-22T23:35:16","version":"0.83"},{"version":"0.84","date":"2008-05-13T14:39:03"},{"date":"2008-10-23T13:17:33","version":"0.86"},{"version":"0.87","date":"2008-10-28T13:10:35"},{"version":"0.83","date":"2008-11-02T16:06:00"},{"date":"2008-11-03T21:38:03","version":"0.83"},{"date":"2009-05-09T09:09:37","version":"0.90"},{"version":"0.91","date":"2009-06-22T20:07:07"},{"date":"2009-07-19T08:55:54","version":"0.92"},{"date":"2009-07-19T09:51:33","version":"0.93"},{"version":"0.94","date":"2009-08-10T18:32:02"},{"date":"2009-09-16T09:14:53","version":"0.95"},{"date":"2009-11-13T10:36:02","version":"0.96"},{"version":"0.97","date":"2010-04-10T15:20:47"},{"date":"2010-07-26T19:24:02","version":"0.98"},{"version":"1.00","date":"2011-02-19T16:00:01"},{"version":"1.01","date":"2011-03-26T12:51:17"},{"date":"2011-04-03T19:59:22","version":"1.02"},{"version":"1.03","date":"2011-07-18T21:29:19"},{"version":"1.04","date":"2011-07-21T09:09:46"},{"version":"1.05","date":"2011-11-02T18:31:39"},{"version":"1.06","date":"2011-11-28T15:50:49"},{"version":"1.07","date":"2011-11-29T18:02:00"},{"date":"2012-02-21T16:07:41","version":"1.08"},{"version":"1.09","date":"2012-09-09T11:14:11"},{"date":"2012-10-20T14:15:34","version":"1.10"},{"date":"2013-09-28T10:27:58","version":"1.11"},{"date":"2013-12-01T14:49:13","version":"1.12"},{"version":"1.13","date":"2013-12-21T12:07:54"},{"date":"2014-08-03T11:34:45","version":"1.14"},{"version":"1.15","date":"2014-08-23T15:39:26"},{"version":"1.16","date":"2014-09-28T16:17:32"},{"version":"1.17","date":"2014-10-31T11:13:34"},{"version":"1.18","date":"2015-01-19T21:56:34"},{"date":"2015-05-27T08:53:42","version":"1.19"},{"version":"1.20","date":"2015-10-04T13:18:36"},{"date":"2016-04-05T10:11:15","version":"1.21"},{"date":"2016-09-17T20:57:48","version":"1.22"},{"version":"1.23","date":"2016-11-16T19:46:41"},{"date":"2017-06-28T17:13:27","version":"1.24"},{"version":"1.25","date":"2018-08-17T22:21:56"},{"version":"1.26","date":"2018-12-12T17:38:39"},{"date":"2018-12-13T17:16:52","version":"1.26_001"},{"version":"1.27","date":"2019-01-15T20:08:40"},{"date":"2020-08-06T08:02:24","version":"1.28"},{"date":"2020-08-16T12:35:20","version":"1.29"},{"date":"2021-01-13T15:02:27","version":"1.30"},{"date":"2021-04-21T14:17:01","version":"1.31"},{"version":"1.31_001","date":"2023-06-14T09:30:00"},{"version":"1.31_002","date":"2023-06-15T11:55:12"},{"date":"2023-06-16T09:04:27","version":"1.31_003"},{"date":"2023-06-18T10:34:43","version":"1.31_004"},{"version":"1.32","date":"2023-07-05T15:58:09"},{"version":"1.33","date":"2023-08-04T15:50:23"},{"version":"1.34","date":"2023-09-24T15:21:05"},{"date":"2023-11-05T12:46:38","version":"1.35"},{"version":"1.37","date":"2024-11-19T16:12:58"}],"main_module":"Module::ScanDeps"},"libwww-perl":{"versions":[{"date":"1995-09-16T13:51:35","version":"5"},{"version":"5","date":"1995-11-06T14:29:13"},{"date":"1996-05-09T22:43:16","version":"5"},{"version":"5.00","date":"1996-05-26T14:01:51"},{"date":"1996-08-02T16:38:58","version":"5.01"},{"version":"5.02","date":"1996-09-11T16:19:57"},{"date":"1996-09-30T22:58:37","version":"5.03"},{"version":"5.04","date":"1996-10-22T10:39:33"},{"date":"1996-12-04T23:36:17","version":"5.05"},{"date":"1997-01-27T23:53:38","version":"5.06"},{"date":"1997-02-11T14:20:18","version":"5.07"},{"date":"1997-04-05T13:10:16","version":"5.08"},{"date":"1997-06-10T11:07:01","version":"5.09"},{"version":"5.10","date":"1997-06-20T10:51:10"},{"date":"1997-08-06T08:41:11","version":"5.11"},{"date":"1997-09-05T09:38:58","version":"5.12"},{"version":"5.13","date":"1997-09-20T12:50:59"},{"version":"5.14","date":"1997-10-12T20:55:32"},{"version":"5.15","date":"1997-11-06T20:23:06"},{"date":"1997-12-12T17:44:29","version":"5.18"},{"version":"5.18_03","date":"1997-12-16T22:25:00"},{"date":"1997-12-17T10:08:54","version":"5.18_04"},{"date":"1998-01-20T18:16:51","version":"5.18_05"},{"date":"1998-01-26T23:55:39","version":"5.19"},{"version":"5.20","date":"1998-02-12T23:43:23"},{"version":"5.21","date":"1998-03-12T18:39:08"},{"date":"1998-03-24T19:42:54","version":"5.22"},{"version":"5.30","date":"1998-03-31T22:25:14"},{"version":"5.31","date":"1998-04-10T15:07:10"},{"version":"5.32","date":"1998-04-17T05:23:45"},{"date":"1998-05-07T15:10:00","version":"5.33"},{"version":"5.34","date":"1998-07-07T16:06:51"},{"date":"1998-07-09T23:05:12","version":"5.35"},{"date":"1998-08-04T15:15:44","version":"5.36"},{"version":"5.40_01","date":"1998-10-12T17:42:28"},{"date":"1998-11-19T22:17:29","version":"5.41"},{"version":"5.42","date":"1999-03-20T07:52:48"},{"date":"1999-05-09T19:26:17","version":"5.43"},{"date":"1999-06-25T20:34:40","version":"5.44"},{"version":"5.45","date":"1999-09-20T13:36:22"},{"date":"1999-10-28T12:30:45","version":"5.46"},{"version":"5.47","date":"1999-11-16T14:59:58"},{"version":"5.48","date":"2000-04-09T19:45:32"},{"version":"5.49","date":"2001-01-01T06:35:20"},{"date":"2001-01-12T20:58:43","version":"5.50"},{"version":"5.51","date":"2001-03-14T21:33:03"},{"version":"5.52","date":"2001-03-29T21:39:12"},{"version":"5.53","date":"2001-04-10T23:15:00"},{"date":"2001-04-19T06:13:35","version":"5.53_90"},{"version":"5.53_91","date":"2001-04-21T05:02:13"},{"date":"2001-04-25T17:37:11","version":"5.53_92"},{"version":"5.53_93","date":"2001-04-29T06:28:31"},{"date":"2001-05-05T13:57:20","version":"5.53_94"},{"date":"2001-08-07T00:46:18","version":"5.53_95"},{"date":"2001-08-28T05:59:46","version":"5.53_96"},{"date":"2001-09-20T00:33:20","version":"5.53_97"},{"version":"5.60","date":"2001-10-26T23:30:57"},{"version":"5.61","date":"2001-11-17T02:56:46"},{"date":"2001-11-21T19:00:47","version":"5.62"},{"date":"2001-12-14T21:01:09","version":"5.63"},{"version":"5.64","date":"2002-02-09T18:54:35"},{"date":"2002-05-31T20:59:15","version":"5.65"},{"date":"2002-12-20T19:28:34","version":"5.66"},{"date":"2003-01-01T16:53:11","version":"5.67"},{"date":"2003-01-03T05:04:44","version":"5.68"},{"version":"5.69","date":"2003-01-24T16:55:35"},{"date":"2003-10-13T20:56:35","version":"5.70"},{"date":"2003-10-14T19:12:56","version":"5.71"},{"date":"2003-10-15T19:53:47","version":"5.72"},{"version":"5.73","date":"2003-10-19T20:04:40"},{"version":"5.74","date":"2003-10-23T19:26:57"},{"version":"5.75","date":"2003-10-26T22:10:48"},{"version":"5.76","date":"2003-11-21T19:33:09"},{"version":"5.77","date":"2004-04-06T13:41:45"},{"date":"2004-04-07T11:13:36","version":"5.78"},{"date":"2004-04-13T08:09:08","version":"5.79"},{"version":"5.800","date":"2004-06-16T10:43:42"},{"version":"5.801","date":"2004-11-12T18:32:17"},{"date":"2004-11-30T13:06:01","version":"5.802"},{"date":"2004-12-11T15:48:30","version":"5.803"},{"date":"2005-12-06T09:36:12","version":"5.804"},{"version":"5.805","date":"2005-12-08T12:29:02"},{"version":"5.806","date":"2007-07-19T21:31:44"},{"version":"5.807","date":"2007-07-31T13:14:54"},{"version":"5.808","date":"2007-08-05T13:29:17"},{"version":"5.810","date":"2008-04-08T11:47:19"},{"version":"5.811","date":"2008-04-14T08:28:19"},{"date":"2008-04-16T10:32:51","version":"5.812"},{"version":"5.813","date":"2008-06-17T20:37:17"},{"version":"5.814","date":"2008-07-25T09:09:53"},{"version":"5.815","date":"2008-09-24T18:10:11"},{"version":"5.816","date":"2008-09-29T09:27:09"},{"date":"2008-10-10T21:31:27","version":"5.817"},{"version":"5.818","date":"2008-10-16T10:32:24"},{"version":"5.819","date":"2008-10-20T11:43:37"},{"date":"2008-11-05T18:07:29","version":"5.820"},{"version":"5.821","date":"2008-11-25T00:16:49"},{"version":"5.822","date":"2008-12-05T19:18:40"},{"version":"5.823","date":"2009-01-12T16:50:02"},{"version":"5.824","date":"2009-02-13T14:12:29"},{"date":"2009-02-16T10:00:35","version":"5.825"},{"version":"5.826","date":"2009-04-24T20:42:45"},{"date":"2009-06-15T19:36:37","version":"5.827"},{"date":"2009-06-25T19:44:55","version":"5.828"},{"date":"2009-07-08T20:03:11","version":"5.829"},{"date":"2009-07-26T19:39:49","version":"5.830"},{"version":"5.831","date":"2009-08-13T20:53:34"},{"date":"2009-09-21T18:24:41","version":"5.832"},{"version":"5.833","date":"2009-10-06T21:23:39"},{"version":"5.834","date":"2009-11-21T13:09:14"},{"version":"5.835","date":"2010-05-05T21:13:47"},{"date":"2010-05-13T07:34:58","version":"5.836"},{"date":"2010-09-20T21:24:38","version":"5.837"},{"date":"2010-11-04T15:16:35","version":"5.837"},{"date":"2011-03-08T19:25:05","version":"6.00"},{"version":"6.01","date":"2011-03-09T23:30:57"},{"date":"2011-03-27T11:35:01","version":"6.02"},{"date":"2011-10-15T13:38:28","version":"6.03"},{"date":"2012-02-18T22:13:13","version":"6.04"},{"date":"2013-03-11T21:47:56","version":"6.05"},{"version":"6.06","date":"2014-04-16T18:38:49"},{"date":"2014-07-02T05:10:47","version":"6.07"},{"date":"2014-07-25T03:19:43","version":"6.08"},{"date":"2015-02-10T02:58:40","version":"6.09"},{"version":"6.10","date":"2015-02-12T17:40:48"},{"date":"2015-02-13T21:38:49","version":"6.11"},{"date":"2015-02-14T00:16:15","version":"6.12"},{"date":"2015-02-14T18:45:12","version":"6.13"},{"date":"2015-11-25T20:23:47","version":"6.14_001"},{"date":"2015-12-05T06:01:09","version":"6.15"},{"date":"2016-01-05T00:29:20","version":"6.15_001"},{"version":"6.15_002","date":"2016-01-14T01:52:18"},{"version":"6.15_003","date":"2016-01-14T02:01:20"},{"version":"6.15_004","date":"2016-02-13T06:18:45"},{"version":"6.16","date":"2017-01-18T14:22:22"},{"date":"2017-01-31T19:39:10","version":"6.17"},{"version":"6.18","date":"2017-02-03T20:31:54"},{"date":"2017-02-14T19:56:20","version":"6.19"},{"version":"6.20","date":"2017-02-21T15:19:06"},{"version":"6.21","date":"2017-02-21T20:38:03"},{"version":"6.22","date":"2017-03-01T15:27:43"},{"version":"6.23","date":"2017-03-07T03:49:52"},{"date":"2017-03-14T16:36:38","version":"6.24"},{"date":"2017-04-03T17:20:06","version":"6.25"},{"date":"2017-04-12T15:36:20","version":"6.26"},{"version":"6.27","date":"2017-09-21T22:32:37"},{"version":"6.28","date":"2017-11-06T15:43:47"},{"version":"6.29","date":"2017-11-06T20:34:56"},{"date":"2017-12-08T01:57:23","version":"6.30"},{"date":"2017-12-11T01:57:47","version":"6.31"},{"date":"2018-02-20T19:41:40","version":"6.32"},{"version":"6.33","date":"2018-02-27T04:04:55"},{"date":"2018-06-05T18:50:45","version":"6.34"},{"date":"2018-07-16T04:51:16","version":"6.35"},{"version":"6.36","date":"2018-10-10T02:21:49"},{"version":"6.37","date":"2019-03-06T20:51:05"},{"date":"2019-03-25T19:00:53","version":"6.38"},{"date":"2019-05-06T14:19:25","version":"6.39"},{"date":"2019-10-24T13:08:25","version":"6.40"},{"date":"2019-10-28T14:45:05","version":"6.41"},{"date":"2019-11-20T17:41:59","version":"6.42"},{"version":"6.43","date":"2019-11-26T13:56:02"},{"version":"6.44","date":"2020-04-14T19:39:37"},{"date":"2020-06-08T14:52:52","version":"6.45"},{"version":"6.46","date":"2020-06-23T21:20:14"},{"version":"6.47","date":"2020-08-18T15:28:34"},{"version":"6.48","date":"2020-09-20T15:26:52"},{"date":"2020-09-24T00:29:49","version":"6.49"},{"version":"6.50","date":"2020-12-16T18:36:35"},{"date":"2020-12-29T22:09:46","version":"6.51"},{"date":"2021-01-07T21:58:27","version":"6.52"},{"version":"6.53","date":"2021-03-07T16:55:35"},{"date":"2021-05-06T17:55:38","version":"6.54"},{"date":"2021-06-17T13:58:40","version":"6.55"},{"version":"6.56","date":"2021-08-17T13:58:19"},{"date":"2021-09-20T20:29:02","version":"6.57"},{"version":"6.58","date":"2021-10-25T20:44:12"},{"version":"6.59","date":"2021-12-02T21:20:00"},{"version":"6.60","date":"2021-12-17T22:33:53"},{"date":"2022-01-21T21:44:31","version":"6.61"},{"version":"6.62","date":"2022-04-05T01:05:20"},{"date":"2022-04-25T15:25:43","version":"6.63"},{"version":"6.64","date":"2022-04-26T13:17:45"},{"version":"6.65","date":"2022-05-09T18:42:27"},{"version":"6.66","date":"2022-05-18T16:57:21"},{"version":"6.67","date":"2022-06-14T20:24:12"},{"version":"6.68","date":"2023-02-27T19:20:03"},{"version":"6.69","date":"2023-04-29T13:15:34"},{"version":"6.70","date":"2023-04-30T13:26:14"},{"date":"2023-06-20T19:46:00","version":"6.71"},{"version":"6.72","date":"2023-07-17T22:02:15"},{"date":"2024-01-13T20:26:02","version":"6.73"},{"version":"6.74","date":"2024-01-22T17:49:13"},{"version":"6.75","date":"2024-01-24T14:30:24"},{"version":"6.76","date":"2024-01-25T18:33:12"},{"date":"2024-03-11T00:58:25","version":"6.77"},{"version":"6.78","date":"2025-02-20T00:44:17"}],"main_module":"LWP","advisories":[{"id":"CPANSA-libwww-perl-2017-01","reviewed_by":[{"name":"Robert Rothenberg","email":"rrwo@cpan.org","date":"2022-06-23"}],"cves":[],"reported":"2017-11-06","fixed_versions":[">=6.27"],"distribution":"libwww-perl","description":"LWP::Protocol::file can open existent file from file:// scheme. However, current version of LWP uses open FILEHANDLE,EXPR and it has ability to execute arbitrary command\n","affected_versions":["<6.28"],"references":["https://github.com/libwww-perl/libwww-perl/pull/270"]},{"distribution":"libwww-perl","description":"The Net::HTTPS module in libwww-perl (LWP) before 6.00, as used in WWW::Mechanize, LWP::UserAgent, and other products, when running in environments that do not set the If-SSL-Cert-Subject header, does not enable full validation of SSL certificates by default, which allows remote attackers to spoof servers via man-in-the-middle (MITM) attacks involving hostnames that are not properly validated.\n","fixed_versions":[">=6.00"],"reported":"2011-01-20","cves":["CVE-2011-0633"],"id":"CPANSA-libwww-perl-2011-01","references":["http://vttynotes.blogspot.com/2010/12/man-in-middle-fun-with-perl-lwp.html","http://vttynotes.blogspot.com/2011/03/quick-note-on-lwp-and-perl-security-cve.html"],"affected_versions":["<6.00"]},{"id":"CPANSA-libwww-perl-2010-01","reported":"2010-07-06","cves":["CVE-2010-2253"],"fixed_versions":[">=5.835"],"distribution":"libwww-perl","description":"lwp-download in libwww-perl before 5.835 does not reject downloads to filenames that begin with a . (dot) character, which allows remote servers to create or overwrite files via (1) a 3xx redirect to a URL with a crafted filename or (2) a Content-Disposition header that suggests a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.\n","affected_versions":["<5.835"],"references":["http://vttynotes.blogspot.com/2010/12/man-in-middle-fun-with-perl-lwp.html","http://vttynotes.blogspot.com/2011/03/quick-note-on-lwp-and-perl-security-cve.html"]},{"affected_versions":["<5.51"],"distribution":"libwww-perl","description":"If LWP::UserAgent::env_proxy is called in a CGI environment, the case-insensitivity when looking for \"http_proxy\" permits \"HTTP_PROXY\" to be found, but this can be trivially set by the web client using the \"Proxy:\" header.\n","reported":"2001-03-14","fixed_versions":[">=5.51"],"cves":[],"id":"CPANSA-libwww-perl-2001-01"},{"references":["https://metacpan.org/dist/libwww-perl/changes"],"affected_versions":["<0.04"],"distribution":"libwww-perl","description":"There is a security hole with the implementation of getBasicCredentials().\n","fixed_versions":[">=0.04"],"reported":"1995-09-06","cves":[],"id":"CPANSA-libwww-perl-1995-01"}]},"Term-ReadLine-Gnu":{"advisories":[{"comment":"The presense of affected versions of Term-ReadLine-Gnu suggests that a vulnerable version of the readline linrary is installed on the host system.\n","external_vulnerability":{"name":"readline","distributed_version":"<=6.3"},"severity":null,"distribution":"Term-ReadLine-Gnu","description":"The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file.\n","fixed_versions":[">=1.27"],"reported":"2014-08-20","cves":["CVE-2014-2524"],"id":"CPANSA-Term-ReadLine-Gnu-2014-2524","affected_versions":["<1.27"],"references":["https://bugzilla.redhat.com/show_bug.cgi?id=1077023","http://lists.gnu.org/archive/html/bug-readline/2014-03/msg00057.html","http://seclists.org/oss-sec/2014/q1/579","http://seclists.org/oss-sec/2014/q1/587","https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135686.html","http://www.mandriva.com/security/advisories?name=MDVSA-2014:154","http://advisories.mageia.org/MGASA-2014-0319.html","http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html","http://www.mandriva.com/security/advisories?name=MDVSA-2015:132"]}],"main_module":"Term::ReadLine::Gnu","versions":[{"version":"0.06","date":"1997-02-07T02:03:51"},{"date":"1997-03-26T07:17:23","version":"0.07"},{"date":"1997-08-25T15:02:01","version":"0.09"},{"version":"0.10","date":"1998-03-31T15:49:08"},{"version":"1.00","date":"1998-04-17T05:23:29"},{"date":"1998-05-13T15:45:47","version":"1.01"},{"version":"1.03","date":"1998-09-30T16:10:02"},{"date":"1999-02-22T17:28:32","version":"1.04"},{"date":"1999-04-10T16:08:54","version":"1.05"},{"version":"1.06","date":"1999-05-05T14:55:21"},{"version":"1.07","date":"1999-07-19T15:13:19"},{"version":"1.08","date":"1999-12-30T13:37:18"},{"version":"1.09","date":"2000-04-03T18:05:33"},{"date":"2001-04-22T14:23:37","version":"1.10"},{"date":"2001-10-28T04:38:19","version":"1.11"},{"date":"2002-03-31T05:54:31","version":"1.12"},{"version":"1.13","date":"2002-07-28T05:07:18"},{"date":"2003-03-17T03:59:29","version":"1.14"},{"date":"2004-10-17T20:00:06","version":"1.15"},{"version":"1.16","date":"2006-04-02T01:36:28"},{"date":"2008-02-07T15:00:09","version":"1.17"},{"date":"2008-02-07T15:52:11","version":"1.17"},{"date":"2009-02-27T14:14:29","version":"1.18"},{"date":"2009-03-20T17:00:37","version":"1.19"},{"date":"2010-05-02T14:26:20","version":"1.20"},{"version":"1.21","date":"2014-03-01T17:19:57"},{"date":"2014-03-05T14:48:24","version":"1.22"},{"version":"1.23","date":"2014-03-19T15:53:44"},{"date":"2014-03-23T11:58:51","version":"1.24"},{"version":"1.25","date":"2014-12-20T13:25:24"},{"version":"1.26","date":"2015-01-31T12:30:45"},{"date":"2015-09-06T06:03:05","version":"1.27"},{"version":"1.28","date":"2015-09-21T13:14:52"},{"version":"1.29","date":"2016-02-29T14:06:51"},{"date":"2016-03-01T15:55:22","version":"1.30"},{"date":"2016-03-06T00:45:52","version":"1.31"},{"version":"1.32","date":"2016-06-07T15:25:50"},{"date":"2016-06-09T17:11:29","version":"1.33"},{"version":"1.34","date":"2016-06-12T14:53:40"},{"version":"1.35","date":"2016-11-03T14:36:40"},{"date":"2019-01-14T05:39:06","version":"1.36"},{"date":"2020-12-27T03:26:23","version":"1.37"},{"date":"2021-02-22T09:48:52","version":"1.38"},{"date":"2021-02-22T14:36:24","version":"1.39"},{"date":"2021-02-23T07:24:27","version":"1.40"},{"version":"1.41","date":"2021-05-01T14:45:09"},{"date":"2021-05-07T03:30:02","version":"1.42"},{"version":"1.43","date":"2022-10-01T08:45:18"},{"date":"2022-11-06T14:03:08","version":"1.44"},{"date":"2022-11-27T13:23:27","version":"1.45"},{"date":"2023-07-01T09:18:33","version":"1.46"}]},"SOAP-Lite":{"versions":[{"date":"2000-09-25T01:49:14","version":"0.36"},{"date":"2000-10-06T01:58:32","version":"0.38"},{"date":"2000-10-09T04:27:51","version":"0.39"},{"version":"0.40","date":"2000-10-16T05:12:09"},{"date":"2000-10-31T15:10:52","version":"0.41"},{"version":"0.42","date":"2000-11-15T15:00:57"},{"date":"2000-11-28T20:43:40","version":"0.43"},{"version":"0.44","date":"2000-12-13T07:37:47"},{"version":"0.45","date":"2001-01-17T17:28:31"},{"date":"2001-02-01T02:23:51","version":"0.46"},{"date":"2001-02-22T07:28:20","version":"0.47"},{"version":"0.50","date":"2001-04-18T19:09:15"},{"date":"2001-07-18T22:39:30","version":"0.51"},{"date":"2001-11-21T19:35:24","version":"0.52"},{"date":"2002-04-16T05:20:54","version":"0.55"},{"date":"2003-10-28T19:27:00","version":"0.60"},{"date":"2004-02-26T16:36:26","version":"0.60"},{"date":"2005-02-22T01:57:43","version":"0.65_3"},{"date":"2005-04-03T09:20:17","version":"0.65_4"},{"date":"2005-05-06T17:24:23","version":"0.65_5"},{"date":"2005-06-03T19:23:20","version":"0.65_6"},{"date":"2005-12-25T08:42:50","version":"0.66"},{"date":"2006-01-04T23:14:27","version":"0.66.1"},{"version":"0.67","date":"2006-01-27T21:43:49"},{"date":"2006-07-06T18:18:56","version":"0.68"},{"version":"0.69","date":"2006-08-16T14:53:50"},{"date":"2007-10-18T20:54:02","version":"0.70_01"},{"version":"0.70_02","date":"2007-11-08T21:30:41"},{"date":"2007-11-18T19:00:11","version":"0.70_03"},{"version":"0.70_04","date":"2008-01-02T17:06:17"},{"date":"2008-02-13T12:28:07","version":"0.70_05"},{"date":"2008-02-16T10:37:04","version":"0.70_06"},{"date":"2008-02-25T21:44:41","version":"0.70_07"},{"date":"2008-02-25T21:50:22","version":"0.70_08"},{"date":"2008-02-28T21:58:13","version":"0.71"},{"date":"2008-03-29T14:13:41","version":"0.71.01"},{"date":"2008-04-14T17:25:25","version":"0.71.02"},{"date":"2008-04-17T20:40:23","version":"v0.71.03"},{"date":"2008-04-22T06:03:55","version":"0.71.04"},{"version":"0.710.05","date":"2008-05-05T21:50:36"},{"version":"0.710.06","date":"2008-06-05T18:47:08"},{"version":"0.710.07","date":"2008-06-13T20:27:05"},{"version":"0.710.08","date":"2008-07-13T20:41:11"},{"date":"2009-09-29T21:20:02","version":"0.710.09"},{"date":"2009-09-30T18:40:30","version":"0.710.10"},{"date":"2010-03-18T20:24:42","version":"0.711"},{"version":"0.712","date":"2010-06-03T15:41:39"},{"version":"0.713","date":"2011-08-16T17:53:28"},{"date":"2011-08-18T19:51:02","version":"0.714"},{"date":"2012-07-15T09:37:20","version":"0.715"},{"date":"2013-05-11T06:44:04","version":"0.716"},{"date":"2013-07-17T06:17:00","version":"1.0"},{"date":"2013-07-29T08:26:07","version":"1.01"},{"version":"1.02","date":"2013-07-30T02:20:34"},{"version":"1.03","date":"2013-08-04T17:49:18"},{"date":"2013-08-10T03:46:49","version":"1.04"},{"date":"2013-08-19T05:31:17","version":"1.05"},{"date":"2013-08-22T04:20:29","version":"1.06"},{"version":"1.07","date":"2013-11-08T03:09:10"},{"version":"1.08","date":"2013-11-08T17:41:10"},{"version":"1.09","date":"2014-01-14T21:41:07"},{"date":"2014-01-23T18:53:42","version":"1.10"},{"version":"1.11","date":"2014-02-22T05:18:14"},{"date":"2014-11-27T07:08:11","version":"1.12"},{"date":"2014-12-30T15:58:06","version":"1.13"},{"version":"1.14","date":"2015-03-25T05:04:34"},{"date":"2015-07-21T18:12:21","version":"1.15"},{"date":"2015-07-23T07:34:59","version":"1.16"},{"date":"2015-07-31T05:59:50","version":"1.17"},{"date":"2015-08-26T04:31:24","version":"1.18"},{"date":"2015-08-26T15:38:01","version":"1.19"},{"version":"1.20","date":"2016-06-09T21:34:36"},{"version":"1.22","date":"2017-08-16T05:18:24"},{"version":"1.23","date":"2017-12-19T02:30:48"},{"date":"2017-12-19T18:36:52","version":"1.24"},{"version":"1.25","date":"2017-12-29T18:39:43"},{"version":"1.26","date":"2017-12-30T22:19:12"},{"date":"2018-05-14T20:36:08","version":"1.27"}],"main_module":"SOAP::Lite","advisories":[{"affected_versions":["<1.15"],"references":["https://metacpan.org/changes/distribution/SOAP-Lite","https://www.securityfocus.com/bid/94487","https://github.com/redhotpenguin/perl-soaplite/commit/6942fe0d281be1c32c5117605f9c4e8d44f51124"],"cves":["CVE-2015-8978"],"reported":"2015-07-21","fixed_versions":[">=1.15"],"description":"An example attack consists of defining 10 or more XML entities, each defined as consisting of 10 of the previous entity, with the document consisting of a single instance of the largest entity, which expands to one billion copies of the first entity. The amount of computer memory used for handling an external SOAP call would likely exceed that available to the process parsing the XML.\n","distribution":"SOAP-Lite","id":"CPANSA-SOAP-Lite-2015-01"},{"severity":"high","affected_versions":["<0.55"],"references":["https://metacpan.org/changes/distribution/SOAP-Lite"],"id":"CPANSA-SOAP-Lite-2002-01","reported":"2002-04-08","fixed_versions":[">=0.55"],"cves":["CVE-2002-1742"],"description":"Allows remote attackers to load arbitrary Perl functions by suppling a non-existent function in a script using a SOAP::Lite module, which causes the AUTOLOAD subroutine to trigger.\n","distribution":"SOAP-Lite"},{"cves":[],"reported":"2000-10-05","fixed_versions":[">=0.38"],"description":"Security problem on server side (no more details).\n","distribution":"SOAP-Lite","id":"CPANSA-SOAP-Lite-2000-01","affected_versions":["<0.38"],"references":["https://metacpan.org/changes/distribution/SOAP-Lite"]}]},"Net-DNS":{"versions":[{"version":"0.02","date":"1997-02-04T10:03:21"},{"version":"0.02","date":"1997-02-05T05:54:07"},{"date":"1997-02-10T16:24:12","version":"0.03"},{"date":"1997-02-13T23:50:40","version":"0.04"},{"version":"0.05","date":"1997-03-28T06:22:18"},{"date":"1997-04-03T06:54:12","version":"0.06"},{"date":"1997-04-19T18:07:46","version":"0.07"},{"version":"0.08","date":"1997-05-13T15:27:34"},{"version":"0.09","date":"1997-05-29T22:16:14"},{"date":"1997-06-13T04:35:29","version":"0.10"},{"date":"1997-07-06T18:10:05","version":"0.11"},{"version":"0.12","date":"1997-10-02T05:53:19"},{"date":"2002-02-01T21:32:42","version":"0.14"},{"date":"2002-04-11T23:04:19","version":"0.19"},{"version":"0.20","date":"2002-05-15T00:39:48"},{"date":"2002-06-03T21:44:48","version":"0.21"},{"date":"2002-06-06T21:48:08","version":"0.22"},{"version":"0.23","date":"2002-06-11T22:49:07"},{"version":"0.24","date":"2002-07-06T20:17:50"},{"date":"2002-08-01T10:37:46","version":"0.25"},{"date":"2002-08-05T20:11:20","version":"0.26"},{"version":"0.27","date":"2002-08-15T15:55:56"},{"date":"2002-08-21T00:18:55","version":"0.28"},{"version":"0.29","date":"2002-10-02T06:09:09"},{"version":"0.30","date":"2002-11-07T13:19:03"},{"version":"0.31","date":"2002-11-18T04:32:09"},{"version":"0.32","date":"2003-01-05T21:37:55"},{"date":"2003-01-08T18:31:53","version":"0.33"},{"date":"2003-03-06T19:19:53","version":"0.34"},{"date":"2003-05-22T02:33:15","version":"0.34_02"},{"date":"2003-05-23T01:24:00","version":"0.34_03"},{"date":"2003-05-26T07:13:38","version":"0.35"},{"version":"0.36","date":"2003-05-28T22:24:43"},{"date":"2003-05-28T22:41:56","version":"0.37"},{"version":"0.38","date":"2003-06-05T23:55:14"},{"date":"2003-06-23T00:19:28","version":"0.38_01"},{"date":"2003-07-29T09:34:12","version":"0.38_02"},{"version":"0.39","date":"2003-08-07T22:35:45"},{"date":"2003-08-12T04:10:01","version":"0.39_01"},{"version":"0.39_02","date":"2003-08-28T15:17:51"},{"version":"0.40","date":"2003-09-01T22:18:39"},{"date":"2003-09-26T22:54:49","version":"0.40_01"},{"version":"0.41","date":"2003-10-03T15:57:27"},{"version":"0.42","date":"2003-10-26T05:42:29"},{"version":"0.42_01","date":"2003-12-01T04:39:24"},{"version":"0.42_02","date":"2003-12-11T08:53:09"},{"version":"0.43","date":"2003-12-12T00:28:17"},{"version":"0.44","date":"2003-12-13T01:55:07"},{"version":"0.44_01","date":"2004-01-03T06:49:06"},{"version":"0.44_02","date":"2004-01-04T04:51:25"},{"version":"0.45","date":"2004-01-08T05:56:11"},{"version":"0.45_01","date":"2004-02-10T00:53:47"},{"version":"0.46","date":"2004-02-21T12:53:34"},{"date":"2004-04-01T07:39:00","version":"0.47"},{"version":"0.47_01","date":"2004-05-06T19:18:31"},{"date":"2004-08-13T01:11:57","version":"0.48"},{"date":"2005-03-07T14:31:55","version":"0.48_01"},{"date":"2005-03-14T20:47:20","version":"0.48_02"},{"date":"2005-03-22T15:54:51","version":"0.48_03"},{"version":"0.49","date":"2005-03-29T13:12:16"},{"version":"0.49_01","date":"2005-05-24T08:07:55"},{"version":"0.49_02","date":"2005-05-28T07:07:52"},{"date":"2005-06-01T20:51:43","version":"0.49_03"},{"date":"2005-06-08T14:15:32","version":"0.50"},{"version":"0.51","date":"2005-06-10T11:00:29"},{"version":"0.49_01","date":"2005-06-14T11:42:54"},{"date":"2005-06-22T14:32:45","version":"0.49_01"},{"date":"2005-07-01T21:50:47","version":"0.52"},{"version":"0.53","date":"2005-07-22T12:23:21"},{"date":"2005-07-31T14:40:15","version":"0.53_01"},{"date":"2005-10-18T14:39:03","version":"0.53_02"},{"version":"0.54","date":"2005-12-07T13:15:30"},{"date":"2005-12-14T10:29:42","version":"0.55"},{"version":"0.56","date":"2006-02-20T15:34:25"},{"date":"2006-02-24T16:21:14","version":"0.57"},{"version":"0.58","date":"2006-07-04T11:42:41"},{"date":"2006-09-18T19:31:10","version":"0.59"},{"date":"2007-06-22T07:31:18","version":"0.60"},{"date":"2007-08-01T12:26:55","version":"0.61"},{"date":"2007-12-28T19:32:25","version":"0.62"},{"version":"0.63","date":"2008-02-08T15:49:50"},{"version":"0.64","date":"2008-12-30T18:11:35"},{"date":"2009-01-26T18:19:23","version":"0.65"},{"version":"0.66","date":"2009-12-30T13:58:25"},{"date":"2011-10-25T12:14:24","version":"0.66_01"},{"date":"2011-10-27T14:23:38","version":"0.66_02"},{"version":"0.66_03","date":"2011-10-28T14:31:06"},{"date":"2011-10-28T15:00:15","version":"0.66_04"},{"date":"2011-10-31T14:36:02","version":"0.66_06"},{"date":"2011-10-31T19:34:01","version":"0.66_07"},{"version":"0.66_08","date":"2011-11-02T21:52:59"},{"version":"0.67","date":"2011-11-07T09:07:56"},{"version":"0.67_01","date":"2012-01-23T13:41:03"},{"date":"2012-01-26T10:44:13","version":"0.67_03"},{"version":"0.67_04","date":"2012-01-27T08:47:28"},{"version":"0.68","date":"2012-01-31T21:54:27"},{"version":"0.68","date":"2012-01-31T22:11:31"},{"version":"0.68_01","date":"2012-10-29T15:35:55"},{"date":"2012-10-31T10:25:57","version":"0.68_02"},{"date":"2012-10-31T20:33:53","version":"0.68_03"},{"version":"0.68_04","date":"2012-11-12T07:15:13"},{"date":"2012-11-12T10:22:31","version":"0.68_05"},{"date":"2012-11-19T12:57:25","version":"0.68_06"},{"date":"2012-11-21T23:12:34","version":"0.68_07"},{"version":"0.68_08","date":"2012-11-23T22:12:01"},{"date":"2012-12-04T07:18:08","version":"0.68_09"},{"version":"0.69","date":"2012-12-05T12:07:43"},{"date":"2012-12-05T14:05:12","version":"0.69_1"},{"date":"2012-12-06T11:10:17","version":"0.70"},{"version":"0.70_1","date":"2012-12-12T16:04:03"},{"version":"0.71","date":"2012-12-15T11:18:56"},{"version":"0.71_01","date":"2012-12-24T21:14:23"},{"version":"0.72","date":"2012-12-28T15:03:57"},{"date":"2013-11-13T15:18:55","version":"0.72_01"},{"date":"2013-11-14T16:13:33","version":"0.72_02"},{"date":"2013-11-18T10:49:23","version":"0.72_03"},{"version":"0.72_04","date":"2013-11-19T21:52:50"},{"date":"2013-11-29T13:35:08","version":"0.73"},{"date":"2013-12-24T15:21:50","version":"0.73_1"},{"version":"0.73_2","date":"2014-01-02T20:32:27"},{"date":"2014-01-05T20:31:16","version":"0.73_3"},{"date":"2014-01-12T10:25:24","version":"0.73_4"},{"date":"2014-01-13T15:59:49","version":"0.73_5"},{"version":"0.74","date":"2014-01-16T10:23:47"},{"version":"0.74_1","date":"2014-03-03T21:33:39"},{"version":"0.74_2","date":"2014-03-10T08:36:19"},{"version":"0.74_3","date":"2014-04-03T21:00:45"},{"date":"2014-04-30T14:05:59","version":"0.74_4"},{"version":"0.74_5","date":"2014-05-05T06:05:46"},{"date":"2014-05-06T09:22:01","version":"0.74_6"},{"version":"0.75","date":"2014-05-08T09:54:21"},{"version":"0.75_1","date":"2014-05-22T20:56:00"},{"version":"0.76","date":"2014-05-23T22:26:56"},{"version":"0.76_1","date":"2014-05-29T11:26:07"},{"version":"0.76_2","date":"2014-06-05T16:04:39"},{"date":"2014-06-13T08:31:32","version":"0.76_3"},{"version":"0.77","date":"2014-06-13T21:57:13"},{"date":"2014-07-02T09:53:03","version":"0.77_1"},{"version":"0.77_2","date":"2014-07-09T07:09:44"},{"version":"0.78","date":"2014-07-10T14:13:33"},{"version":"0.78_1","date":"2014-07-30T21:41:25"},{"version":"0.78_2","date":"2014-08-12T22:13:54"},{"date":"2014-08-15T14:40:22","version":"0.78_3"},{"version":"0.78_5","date":"2014-08-19T13:24:46"},{"date":"2014-08-22T22:29:13","version":"0.79"},{"date":"2014-09-11T11:42:35","version":"0.79_1"},{"version":"0.79_2","date":"2014-09-15T14:51:32"},{"date":"2014-09-22T11:51:22","version":"0.80"},{"date":"2014-10-20T08:19:15","version":"0.80_1"},{"version":"0.80_2","date":"2014-10-24T08:21:15"},{"version":"0.81","date":"2014-10-29T13:44:16"},{"date":"2015-01-05T10:22:06","version":"0.81_01"},{"date":"2015-01-20T14:12:38","version":"0.82"},{"version":"0.82_01","date":"2015-02-11T14:26:36"},{"version":"0.82_02","date":"2015-02-18T11:05:47"},{"date":"2015-02-26T15:48:06","version":"0.83"},{"date":"2015-05-27T10:04:50","version":"1.00_01"},{"date":"2015-06-11T17:23:10","version":"1.00_02"},{"version":"1.00_03","date":"2015-06-15T10:02:08"},{"version":"1.00_04","date":"2015-06-23T13:57:29"},{"date":"2015-06-26T09:37:11","version":"1.00_05"},{"date":"2015-06-29T17:15:06","version":"1.00_06"},{"date":"2015-07-01T13:51:22","version":"1.00_07"},{"version":"1.00_08","date":"2015-07-02T08:17:44"},{"version":"1.01","date":"2015-07-06T17:28:32"},{"date":"2015-08-26T20:44:25","version":"1.01_01"},{"date":"2015-09-03T06:21:58","version":"1.01_02"},{"date":"2015-09-04T20:39:37","version":"1.01_03"},{"date":"2015-09-08T08:26:06","version":"1.01_04"},{"version":"1.01_05","date":"2015-09-11T11:49:24"},{"version":"1.01_06","date":"2015-09-15T18:51:53"},{"date":"2015-09-16T10:25:09","version":"1.02"},{"version":"1.02_01","date":"2015-09-22T13:39:43"},{"version":"1.02_02","date":"2015-10-05T08:30:03"},{"version":"1.02_03","date":"2015-10-06T20:39:36"},{"date":"2015-10-08T21:24:29","version":"1.02_04"},{"date":"2015-10-13T07:30:39","version":"1.02_05"},{"date":"2015-10-14T12:44:57","version":"1.02_06"},{"date":"2015-10-20T09:59:26","version":"1.02_07"},{"version":"1.02_08","date":"2015-10-23T08:32:04"},{"version":"1.02_09","date":"2015-10-27T16:07:21"},{"version":"1.02_10","date":"2015-11-02T06:00:09"},{"date":"2015-11-08T13:49:33","version":"1.03"},{"date":"2015-12-01T21:21:55","version":"1.03_01"},{"version":"1.03_02","date":"2015-12-02T14:27:42"},{"date":"2015-12-02T20:49:07","version":"1.03_03"},{"version":"1.04","date":"2015-12-08T20:41:10"},{"version":"1.04_01","date":"2016-02-01T16:26:27"},{"date":"2016-02-02T08:03:42","version":"1.04_02"},{"date":"2016-02-05T12:19:57","version":"1.04_03"},{"date":"2016-02-29T12:32:53","version":"1.04_04"},{"date":"2016-03-07T21:11:01","version":"1.05"},{"date":"2016-03-21T13:15:38","version":"1.05_01"},{"date":"2016-03-24T18:45:15","version":"1.05_02"},{"date":"2016-04-04T21:53:54","version":"1.05_03"},{"version":"1.05_04","date":"2016-04-15T10:11:03"},{"version":"1.05_05","date":"2016-04-17T12:05:46"},{"version":"1.05_06","date":"2016-05-11T08:58:51"},{"date":"2016-05-22T07:54:41","version":"1.05_07"},{"version":"1.06","date":"2016-05-27T19:12:44"},{"version":"1.06_01","date":"2016-06-22T08:54:06"},{"date":"2016-08-24T11:36:13","version":"1.06_02"},{"date":"2016-08-25T15:01:31","version":"1.06_03"},{"version":"1.06_04","date":"2016-09-17T08:19:30"},{"date":"2016-11-12T03:24:33","version":"1.06_05"},{"date":"2016-12-23T14:48:42","version":"1.06_06"},{"version":"1.07","date":"2016-12-29T17:16:20"},{"date":"2017-01-18T21:51:05","version":"1.07_01"},{"version":"1.07_02","date":"2017-01-27T10:44:03"},{"date":"2017-02-09T10:28:55","version":"1.07_03"},{"date":"2017-02-13T10:08:41","version":"1.07_04"},{"date":"2017-02-20T11:12:45","version":"1.08"},{"version":"1.08_02","date":"2017-03-06T09:33:06"},{"version":"1.08_03","date":"2017-03-13T10:02:22"},{"date":"2017-03-22T09:48:52","version":"1.08_04"},{"version":"1.09","date":"2017-03-24T07:00:36"},{"date":"2017-04-19T13:10:57","version":"1.09_01"},{"date":"2017-05-05T22:21:10","version":"1.10"},{"date":"2017-05-31T09:07:40","version":"1.10_01"},{"date":"2017-06-03T20:26:47","version":"1.10_02"},{"date":"2017-06-12T12:03:07","version":"1.10_03"},{"date":"2017-06-26T12:52:57","version":"1.11"},{"date":"2017-07-07T21:50:10","version":"1.11_01"},{"version":"1.11_02","date":"2017-07-28T16:17:01"},{"version":"1.11_03","date":"2017-08-15T10:33:15"},{"version":"1.11_04","date":"2017-08-17T12:48:08"},{"version":"1.12","date":"2017-08-18T13:15:31"},{"version":"1.12_01","date":"2017-09-12T09:28:26"},{"version":"1.12_02","date":"2017-10-06T09:07:45"},{"version":"1.12_03","date":"2017-10-10T14:42:38"},{"date":"2017-10-18T09:49:20","version":"1.13"},{"date":"2017-11-30T11:11:55","version":"1.13_01"},{"date":"2017-12-07T10:17:12","version":"1.13_02"},{"version":"1.14","date":"2017-12-15T12:34:59"},{"version":"1.14_01","date":"2018-01-31T10:11:39"},{"version":"1.14_02","date":"2018-02-01T14:14:07"},{"date":"2018-02-09T11:42:14","version":"1.15"},{"version":"1.15_01","date":"2018-06-11T09:20:56"},{"date":"2018-06-14T10:46:39","version":"1.15_02"},{"version":"1.15_03","date":"2018-07-03T09:05:15"},{"date":"2018-07-06T10:03:02","version":"1.15_04"},{"version":"1.16","date":"2018-07-16T04:56:07"},{"version":"1.16_01","date":"2018-07-20T16:22:38"},{"date":"2018-07-24T15:35:14","version":"1.16_02"},{"version":"1.17","date":"2018-07-25T07:10:24"},{"version":"1.17_01","date":"2018-09-11T10:24:34"},{"date":"2018-09-11T15:32:52","version":"1.17_02"},{"version":"1.17_03","date":"2018-09-12T06:15:44"},{"version":"1.18","date":"2018-09-21T14:49:48"},{"date":"2018-11-08T06:39:55","version":"1.18_01"},{"date":"2018-11-15T06:02:14","version":"1.19"},{"version":"1.19_01","date":"2018-12-31T12:23:28"},{"date":"2019-01-28T09:48:25","version":"1.19_02"},{"date":"2019-03-22T08:40:39","version":"1.19_03"},{"version":"1.20","date":"2019-03-22T14:13:56"},{"version":"1.20_01","date":"2019-07-21T09:20:43"},{"date":"2019-07-23T14:51:08","version":"1.20_02"},{"version":"1.20_03","date":"2019-08-21T13:49:42"},{"version":"1.21","date":"2019-08-30T08:37:40"},{"version":"1.21_01","date":"2020-02-02T21:54:31"},{"version":"1.22","date":"2020-02-13T13:56:48"},{"date":"2020-03-17T09:09:32","version":"1.22_01"},{"date":"2020-03-18T14:55:27","version":"1.23"},{"date":"2020-05-13T09:04:51","version":"1.23_01"},{"date":"2020-05-27T12:47:25","version":"1.24"},{"date":"2020-06-19T10:52:05","version":"1.24_01"},{"version":"1.24_02","date":"2020-06-23T13:07:04"},{"version":"1.25","date":"2020-06-26T15:40:24"},{"version":"1.25_01","date":"2020-07-28T12:55:42"},{"date":"2020-07-31T08:43:21","version":"1.25_02"},{"version":"1.26","date":"2020-08-06T15:55:03"},{"date":"2020-08-31T13:51:53","version":"1.26_01"},{"version":"1.26_02","date":"2020-09-07T08:02:00"},{"version":"1.27","date":"2020-09-11T18:53:08"},{"date":"2020-10-08T22:00:15","version":"1.27_01"},{"version":"1.27_02","date":"2020-10-16T10:20:24"},{"version":"1.27_03","date":"2020-10-19T08:09:59"},{"date":"2020-10-23T16:53:49","version":"1.28"},{"version":"1.28_01","date":"2020-11-16T16:33:26"},{"date":"2020-11-18T13:40:46","version":"1.29"},{"date":"2020-12-24T15:37:27","version":"1.29_01"},{"date":"2021-03-22T08:38:47","version":"1.29_02"},{"date":"2021-03-28T09:38:33","version":"1.29_03"},{"date":"2021-03-30T10:06:50","version":"1.30"},{"version":"1.31","date":"2021-05-02T12:43:26"},{"version":"1.31_01","date":"2021-07-09T09:57:13"},{"date":"2021-07-16T14:24:25","version":"1.32"},{"version":"1.32_01","date":"2021-08-11T10:07:26"},{"date":"2021-12-08T10:42:13","version":"1.32_02"},{"date":"2021-12-16T12:22:39","version":"1.33"},{"date":"2022-05-21T10:05:03","version":"1.33_01"},{"version":"1.34","date":"2022-05-30T13:39:34"},{"date":"2022-09-23T13:43:05","version":"1.34_01"},{"version":"1.34_02","date":"2022-10-04T13:44:45"},{"version":"1.35","date":"2022-10-04T20:02:07"},{"version":"1.35_01","date":"2022-12-20T14:45:20"},{"version":"1.35_02","date":"2022-12-21T11:28:18"},{"date":"2022-12-28T13:12:39","version":"1.35_03"},{"version":"1.36","date":"2022-12-30T15:53:37"},{"version":"1.36_01","date":"2023-01-30T14:07:07"},{"version":"1.36_02","date":"2023-02-20T15:36:17"},{"version":"1.36_03","date":"2023-03-06T12:19:36"},{"date":"2023-03-13T18:06:16","version":"1.37"},{"version":"1.37_01","date":"2023-03-30T19:26:05"},{"version":"1.37_02","date":"2023-04-17T12:34:49"},{"date":"2023-04-20T12:38:12","version":"1.37_03"},{"version":"1.37_04","date":"2023-04-25T20:37:19"},{"version":"1.38","date":"2023-05-09T10:50:45"},{"version":"1.38_01","date":"2023-05-31T14:12:28"},{"version":"1.39","date":"2023-06-01T11:46:37"},{"version":"1.39_01","date":"2023-08-23T14:53:17"},{"date":"2023-08-25T12:50:35","version":"1.39_02"},{"version":"1.40","date":"2023-08-30T18:16:07"},{"version":"1.40_01","date":"2023-11-22T08:42:22"},{"date":"2023-11-27T13:28:04","version":"1.41"},{"date":"2023-12-24T15:48:59","version":"1.42"},{"date":"2024-01-04T11:21:08","version":"1.42_01"},{"version":"1.42_02","date":"2024-01-08T09:38:46"},{"date":"2024-01-10T15:04:01","version":"1.42_03"},{"date":"2024-01-17T09:07:40","version":"1.42_04"},{"date":"2024-01-25T11:08:34","version":"1.42_05"},{"date":"2024-01-26T14:54:33","version":"1.43"},{"date":"2024-02-14T09:22:32","version":"1.43_01"},{"version":"1.44","date":"2024-02-15T13:03:57"},{"date":"2024-04-21T08:24:10","version":"1.44_01"},{"version":"1.45","date":"2024-05-02T11:03:24"},{"date":"2024-07-26T03:56:44","version":"1.45_01"},{"date":"2024-08-12T09:53:41","version":"1.45_02"},{"version":"1.46","date":"2024-08-19T15:12:15"},{"date":"2024-09-18T20:46:06","version":"1.47"},{"date":"2024-11-07T14:13:26","version":"1.47_01"},{"date":"2024-11-08T13:27:46","version":"1.48"},{"date":"2024-12-16T13:43:49","version":"1.48_01"},{"date":"2024-12-18T14:24:48","version":"1.48_02"},{"version":"1.49","date":"2024-12-27T13:12:51"},{"date":"2025-01-02T16:36:47","version":"1.49_01"},{"version":"1.49_02","date":"2025-01-29T09:05:23"},{"version":"1.49_03","date":"2025-02-08T16:50:50"},{"date":"2025-02-10T13:49:02","version":"1.49_04"},{"version":"1.49_05","date":"2025-02-11T15:56:15"},{"version":"1.50","date":"2025-02-21T08:48:19"}],"main_module":"Net::DNS","advisories":[{"references":["https://metacpan.org/changes/distribution/Net-DNS"],"affected_versions":["<0.63"],"id":"CPANSA-Net-DNS-2008-01","reported":"2008-02-08","fixed_versions":[">=0.63"],"cves":["CVE-2007-6341"],"description":"Allows remote attackers to cause a denial of service (program \"croak\") via a crafted DNS response.\n","distribution":"Net-DNS"},{"distribution":"Net-DNS","description":"Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop.\n","reported":"2007-06-26","cves":["CVE-2007-3409"],"fixed_versions":[">=0.60"],"id":"CPANSA-Net-DNS-2007-3409","references":["http://rt.cpan.org/Public/Bug/Display.html?id=27285","http://www.net-dns.org/docs/Changes.html","http://www.gentoo.org/security/en/glsa/glsa-200708-06.xml","http://www.mandriva.com/security/advisories?name=MDKSA-2007:146","http://www.redhat.com/support/errata/RHSA-2007-0674.html","ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc","http://www.novell.com/linux/security/advisories/2007_17_sr.html","http://www.trustix.org/errata/2007/0023/","http://www.ubuntu.com/usn/usn-483-1","http://www.securityfocus.com/bid/24669","http://www.securitytracker.com/id?1018376","http://secunia.com/advisories/25829","http://secunia.com/advisories/26014","http://secunia.com/advisories/26055","http://secunia.com/advisories/26012","http://secunia.com/advisories/26075","http://secunia.com/advisories/26211","http://secunia.com/advisories/26231","http://secunia.com/advisories/26417","http://secunia.com/advisories/26543","http://www.debian.org/security/2008/dsa-1515","http://secunia.com/advisories/29354","http://osvdb.org/37054","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10595","http://www.securityfocus.com/archive/1/473871/100/0/threaded"],"affected_versions":["<0.60"],"severity":null},{"id":"CPANSA-Net-DNS-2007-3377","description":"Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.\n","distribution":"Net-DNS","cves":["CVE-2007-3377"],"reported":"2007-06-25","fixed_versions":[">=0.60"],"severity":null,"affected_versions":["<0.60"],"references":["http://www.nntp.perl.org/group/perl.qpsmtpd/2006/03/msg4810.html","http://rt.cpan.org/Public/Bug/Display.html?id=23961","https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245458","http://www.net-dns.org/docs/Changes.html","http://support.avaya.com/elmodocs2/security/ASA-2007-351.htm","http://www.gentoo.org/security/en/glsa/glsa-200708-06.xml","http://www.mandriva.com/security/advisories?name=MDKSA-2007:146","http://www.redhat.com/support/errata/RHSA-2007-0674.html","http://www.redhat.com/support/errata/RHSA-2007-0675.html","ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc","http://www.novell.com/linux/security/advisories/2007_17_sr.html","http://www.trustix.org/errata/2007/0023/","http://www.ubuntu.com/usn/usn-483-1","http://www.securityfocus.com/bid/24669","http://www.securitytracker.com/id?1018377","http://secunia.com/advisories/25829","http://secunia.com/advisories/26014","http://secunia.com/advisories/26055","http://secunia.com/advisories/26012","http://secunia.com/advisories/26075","http://secunia.com/advisories/26211","http://secunia.com/advisories/26231","http://secunia.com/advisories/26417","http://secunia.com/advisories/26508","http://secunia.com/advisories/26543","http://www.debian.org/security/2008/dsa-1515","http://secunia.com/advisories/29354","http://osvdb.org/37053","https://exchange.xforce.ibmcloud.com/vulnerabilities/35112","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9904","http://www.securityfocus.com/archive/1/473871/100/0/threaded"]}]},"Crypt-OpenSSL-DSA":{"versions":[{"version":"0.01","date":"2001-09-19T04:45:14"},{"version":"0.02","date":"2001-09-24T17:32:49"},{"version":"0.03","date":"2002-02-07T05:57:36"},{"version":"0.04","date":"2002-09-24T04:52:06"},{"date":"2002-09-26T00:21:17","version":"0.10"},{"version":"0.11","date":"2003-01-06T19:08:08"},{"version":"0.12","date":"2005-05-23T01:44:36"},{"version":"0.13","date":"2005-10-15T21:37:10"},{"version":"0.14","date":"2012-10-16T22:55:16"},{"version":"0.15","date":"2015-02-03T21:57:37"},{"date":"2016-10-27T11:25:18","version":"0.16"},{"date":"2016-10-27T18:54:42","version":"0.17"},{"date":"2016-11-17T10:33:35","version":"0.18"},{"version":"0.19","date":"2017-01-13T08:24:56"},{"date":"2021-03-20T12:31:50","version":"0.20"}],"main_module":"Crypt::OpenSSL::DSA","advisories":[{"reported":"2009-01-15","fixed_versions":[">=0.14"],"cves":["CVE-2009-0129"],"description":"Missing error check in do_verify, which might allow remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature.\n","distribution":"Crypt-OpenSSL-DSA","id":"CPANSA-Crypt-OpenSSL-DSA-2009-01","references":["https://metacpan.org/changes/distribution/Crypt-OpenSSL-DSA","https://www.openwall.com/lists/oss-security/2009/01/12/4","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511519"],"affected_versions":["<0.14"]}]},"String-Compare-ConstantTime":{"versions":[{"version":"0.20","date":"2012-07-13T00:08:31"},{"date":"2012-10-10T01:38:04","version":"0.300"},{"version":"0.310","date":"2014-09-24T03:21:54"},{"version":"0.311","date":"2015-10-24T21:53:39"},{"date":"2017-02-14T16:57:07","version":"0.312"},{"version":"0.320","date":"2018-04-23T16:13:42"},{"date":"2019-06-17T13:33:11","version":"0.321"}],"main_module":"String::Compare::ConstantTime","advisories":[{"id":"CPANSA-String-Compare-ConstantTime-2024-13939","cves":["CVE-2024-13939"],"reported":"2025-03-28","fixed_versions":[],"description":"String::Compare::ConstantTime for Perl through 0.321 is vulnerable to timing attacks that allow an attacker to guess the length of a secret string. As stated in the documentation: \"If the lengths of the strings are different, because equals returns false right away the size of the secret string may be leaked (but not its contents).\" This is similar to CVE-2020-36829","distribution":"String-Compare-ConstantTime","severity":null,"affected_versions":["<=0.321"],"references":["https://metacpan.org/release/FRACTAL/String-Compare-ConstantTime-0.321/view/lib/String/Compare/ConstantTime.pm#TIMING-SIDE-CHANNEL"]}]},"GBrowse":{"advisories":[{"references":["https://metacpan.org/changes/distribution/GBrowse"],"affected_versions":["<2.56"],"reported":"2017-01-15","fixed_versions":[">=2.56"],"cves":[],"description":"An attacker is able to delete other users' accounts. No httponly cookie flag. Cross-site scripting vulnerability in generation of citation text.\n","distribution":"GBrowse","id":"CPANSA-GBrowse-2017-01"},{"affected_versions":["<1.62"],"references":["https://metacpan.org/changes/distribution/GBrowse"],"id":"CPANSA-GBrowse-2004-01","cves":[],"reported":"2004-04-05","fixed_versions":[">=1.62"],"distribution":"GBrowse","description":"Cross-site scripting.\n"},{"id":"CPANSA-GBrowse-2003-01","fixed_versions":[">=1.54"],"reported":"2003-08-23","cves":[],"description":"Path traversal.\n","distribution":"GBrowse","affected_versions":["<1.54"],"references":["https://metacpan.org/changes/distribution/GBrowse"]}],"versions":[{"version":"1.981","date":"2008-12-29T15:38:27"},{"version":"1.982","date":"2008-12-29T17:21:12"},{"date":"2009-01-06T07:42:56","version":"1.983"},{"date":"2009-01-06T09:17:54","version":"1.984"},{"version":"1.985","date":"2009-01-10T12:37:42"},{"version":"1.986","date":"2009-01-12T16:58:20"},{"version":"1.987","date":"2009-01-22T19:49:50"},{"version":"1.988","date":"2009-01-30T00:12:57"},{"date":"2009-03-10T19:24:17","version":"1.989"},{"version":"1.99","date":"2009-04-03T19:29:22"},{"date":"2009-05-04T05:30:31","version":"1.991"},{"version":"1.992","date":"2009-05-05T23:40:00"},{"version":"1.993","date":"2009-05-07T14:11:11"},{"date":"2009-05-30T22:07:17","version":"1.994"},{"version":"1.995","date":"2009-06-08T21:27:08"},{"date":"2009-07-06T14:12:57","version":"1.996"},{"date":"2009-07-30T16:40:54","version":"1.997"},{"date":"2009-08-19T19:19:44","version":"1.9971"},{"date":"2009-12-09T21:39:37","version":"1.998"},{"date":"2009-12-15T15:59:37","version":"1.9982"},{"date":"2009-12-18T19:25:25","version":"1.9983"},{"version":"1.9984","date":"2009-12-22T21:20:40"},{"version":"1.999","date":"2009-12-23T21:56:31"},{"date":"2010-01-28T02:58:41","version":"2.00"},{"version":"2.01","date":"2010-02-09T18:13:33"},{"version":"2.02","date":"2010-03-10T05:56:50"},{"version":"2.03","date":"2010-03-25T16:06:21"},{"version":"2.04","date":"2010-04-18T21:44:27"},{"date":"2010-05-13T03:30:32","version":"2.05"},{"version":"2.06","date":"2010-05-13T21:17:05"},{"version":"2.07","date":"2010-05-17T14:49:41"},{"version":"2.08","date":"2010-05-21T02:52:47"},{"version":"2.09","date":"2010-06-10T20:17:32"},{"version":"2.10","date":"2010-06-15T14:20:30"},{"date":"2010-06-30T19:15:37","version":"2.11"},{"version":"2.12","date":"2010-06-30T19:30:03"},{"version":"2.13","date":"2010-07-05T20:17:39"},{"version":"2.14","date":"2010-08-27T15:06:04"},{"version":"2.15","date":"2010-09-13T22:17:44"},{"version":"2.16","date":"2010-11-01T16:24:01"},{"date":"2010-11-18T17:08:57","version":"2.17"},{"date":"2011-01-18T22:35:59","version":"2.20"},{"version":"2.21","date":"2011-01-22T17:17:34"},{"date":"2011-01-26T14:31:35","version":"2.22"},{"date":"2011-01-30T20:03:25","version":"2.23"},{"version":"2.24","date":"2011-01-31T17:19:08"},{"version":"2.25","date":"2011-02-02T18:53:40"},{"version":"2.26","date":"2011-02-04T18:51:54"},{"version":"2.27","date":"2011-04-10T21:07:42"},{"version":"2.28","date":"2011-04-10T21:32:05"},{"date":"2011-05-02T16:12:11","version":"2.29"},{"date":"2011-05-03T12:17:18","version":"2.30"},{"date":"2011-05-03T15:50:21","version":"2.31"},{"date":"2011-05-04T18:47:51","version":"2.32"},{"date":"2011-05-07T03:27:32","version":"2.33"},{"version":"2.34","date":"2011-06-01T15:19:47"},{"version":"2.35","date":"2011-06-03T13:41:28"},{"version":"2.36","date":"2011-06-04T14:58:14"},{"version":"2.37","date":"2011-06-06T21:24:59"},{"date":"2011-06-09T16:00:48","version":"2.38"},{"version":"2.39","date":"2011-06-29T17:45:00"},{"version":"2.40","date":"2011-09-30T16:56:29"},{"version":"2.41","date":"2011-10-07T13:31:48"},{"date":"2011-10-12T19:33:22","version":"2.42"},{"date":"2011-10-24T16:43:23","version":"2.43"},{"date":"2011-12-08T23:09:26","version":"2.44"},{"version":"2.45","date":"2012-01-03T21:35:41"},{"date":"2012-02-10T17:28:20","version":"2.46"},{"version":"2.47","date":"2012-02-16T12:40:04"},{"version":"2.48","date":"2012-02-24T21:06:10"},{"date":"2012-04-17T23:48:26","version":"2.49"},{"version":"2.50","date":"2012-09-04T16:22:21"},{"version":"2.51","date":"2012-09-18T03:01:31"},{"date":"2012-09-26T02:54:36","version":"2.52"},{"date":"2012-12-10T11:23:34","version":"2.53"},{"date":"2012-12-11T15:49:03","version":"2.54"},{"date":"2013-07-10T14:51:25","version":"2.55"},{"version":"2.56","date":"2017-01-15T21:29:11"}],"main_module":"CGI::Toggle"},"PathTools":{"advisories":[{"references":["https://metacpan.org/changes/distribution/PathTools"],"affected_versions":["<3.65"],"fixed_versions":[">=3.65"],"reported":"2016-02-08","cves":["CVE-2016-1238"],"distribution":"PathTools","description":"Does not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","id":"CPANSA-PathTools-2016-02"},{"affected_versions":["<3.62"],"references":["https://metacpan.org/changes/distribution/PathTools"],"id":"CPANSA-PathTools-2016-01","description":"Does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.\n","distribution":"PathTools","cves":["CVE-2015-8607"],"reported":"2016-01-11","fixed_versions":[">=3.62"]}],"versions":[{"date":"2004-09-03T03:40:00","version":"3.00"},{"date":"2004-09-07T03:39:26","version":"3.01"},{"version":"3.01_01","date":"2004-11-19T04:26:35"},{"date":"2004-11-29T04:20:10","version":"3.01_02"},{"date":"2004-11-30T02:34:46","version":"3.01_03"},{"date":"2005-01-10T01:33:05","version":"3.02"},{"version":"3.03","date":"2005-01-22T03:59:59"},{"version":"3.04","date":"2005-02-07T00:28:43"},{"date":"2005-02-28T13:27:37","version":"3.05"},{"date":"2005-04-14T02:06:10","version":"3.06"},{"date":"2005-05-06T12:50:38","version":"3.07"},{"version":"3.08","date":"2005-05-28T15:13:27"},{"date":"2005-06-15T23:45:19","version":"3.09"},{"version":"3.10","date":"2005-08-26T03:29:11"},{"date":"2005-08-28T01:16:38","version":"3.11"},{"version":"3.12","date":"2005-10-04T03:14:00"},{"version":"3.13","date":"2005-11-16T05:58:53"},{"version":"3.14","date":"2005-11-18T00:15:37"},{"version":"3.14_01","date":"2005-12-10T04:51:57"},{"date":"2005-12-14T05:11:27","version":"3.14_02"},{"version":"3.15","date":"2005-12-27T20:32:26"},{"version":"3.16","date":"2006-01-31T02:52:07"},{"date":"2006-03-03T22:55:18","version":"3.17"},{"version":"3.18","date":"2006-04-28T03:04:00"},{"date":"2006-07-12T03:43:15","version":"3.19"},{"date":"2006-10-05T02:18:51","version":"3.21"},{"version":"3.22","date":"2006-10-10T02:53:23"},{"date":"2006-10-11T17:13:59","version":"3.23"},{"date":"2006-11-20T04:53:56","version":"3.24"},{"date":"2007-05-22T02:08:53","version":"3.25"},{"date":"2007-10-14T02:15:40","version":"3.25_01"},{"version":"3.2501","date":"2007-12-25T02:34:28"},{"version":"3.26","date":"2008-01-14T12:02:28"},{"version":"3.26_01","date":"2008-01-15T23:27:33"},{"date":"2008-01-17T02:21:47","version":"3.27"},{"date":"2008-02-12T03:46:01","version":"3.2701"},{"date":"2008-07-26T02:19:45","version":"3.28_01"},{"version":"3.28_02","date":"2008-10-27T19:27:37"},{"date":"2008-10-27T21:16:35","version":"3.28_03"},{"version":"3.29","date":"2008-10-29T20:11:52"},{"version":"3.29_01","date":"2009-05-07T18:27:46"},{"date":"2009-05-10T08:59:46","version":"3.30"},{"version":"3.30_01","date":"2009-09-21T12:46:15"},{"version":"3.30_02","date":"2009-09-29T06:22:30"},{"version":"3.31","date":"2009-11-01T14:22:36"},{"date":"2010-07-23T08:10:31","version":"3.31_02"},{"date":"2010-09-17T13:24:05","version":"3.31_03"},{"date":"2010-09-19T15:53:14","version":"3.32"},{"date":"2010-09-20T07:54:00","version":"3.33"},{"version":"3.39_01","date":"2011-12-20T07:42:29"},{"version":"3.40","date":"2013-01-16T06:35:08"},{"date":"2014-05-01T18:34:31","version":"3.46_01"},{"version":"3.47","date":"2014-05-23T17:00:38"},{"version":"3.56_01","date":"2015-07-11T22:18:08"},{"version":"3.56_02","date":"2015-07-16T15:33:27"},{"version":"3.58_01","date":"2015-11-09T22:09:25"},{"date":"2015-11-13T23:46:00","version":"3.59"},{"version":"3.60","date":"2015-11-19T02:32:50"},{"version":"3.62","date":"2016-01-11T13:49:31"},{"version":"3.73","date":"2018-02-18T20:27:27"},{"version":"3.74","date":"2018-02-19T08:41:14"},{"version":"3.75","date":"2018-08-29T19:53:19"},{"date":"1994-10-17T00:00:00","version":null,"dual_lived":1,"perl_release":"5.000"},{"date":"1997-05-15T00:00:00","version":"2.00","dual_lived":1,"perl_release":"5.004"},{"date":"1999-04-29T00:00:00","version":"2.01","dual_lived":1,"perl_release":"5.00405"},{"version":"2.02","dual_lived":1,"perl_release":"5.006000","date":"2000-03-22T00:00:00"},{"date":"2001-04-08T00:00:00","perl_release":"5.006001","dual_lived":1,"version":"2.04"},{"date":"2002-03-05T00:00:00","version":"2.06","dual_lived":1,"perl_release":"5.007003"},{"dual_lived":1,"version":"2.08","perl_release":"5.008001","date":"2003-09-25T00:00:00"},{"date":"2004-01-14T00:00:00","dual_lived":1,"version":"2.12","perl_release":"5.008003"},{"date":"2004-04-21T00:00:00","perl_release":"5.008004","version":"2.17","dual_lived":1},{"version":"2.19","dual_lived":1,"perl_release":"5.008005","date":"2004-07-19T00:00:00"},{"perl_release":"5.011","version":"3.3002","dual_lived":1,"date":"2009-10-02T00:00:00"},{"date":"2010-10-20T00:00:00","dual_lived":1,"version":"3.34","perl_release":"5.013006"},{"version":"3.35","dual_lived":1,"perl_release":"5.013008","date":"2010-12-20T00:00:00"},{"date":"2011-01-20T00:00:00","version":"3.36","dual_lived":1,"perl_release":"5.013009"},{"version":"3.37","dual_lived":1,"perl_release":"5.013010","date":"2011-02-20T00:00:00"},{"perl_release":"5.015006","dual_lived":1,"version":"3.38","date":"2011-12-20T00:00:00"},{"date":"2012-02-20T00:00:00","dual_lived":1,"version":"3.39_02","perl_release":"5.015008"},{"perl_release":"5.017007","dual_lived":1,"version":"3.39_03","date":"2012-12-18T00:00:00"},{"date":"2013-06-21T00:00:00","version":"3.41","dual_lived":1,"perl_release":"5.019001"},{"date":"2013-08-20T00:00:00","perl_release":"5.019003","version":"3.44","dual_lived":1},{"version":"3.45","dual_lived":1,"perl_release":"5.019005","date":"2013-10-20T00:00:00"},{"dual_lived":1,"version":"3.48","perl_release":"5.020001","date":"2014-09-14T00:00:00"},{"date":"2015-02-14T00:00:00","version":"3.48_01","dual_lived":1,"perl_release":"5.020002"},{"dual_lived":1,"version":"3.49","perl_release":"5.021002","date":"2014-07-20T00:00:00"},{"dual_lived":1,"version":"3.50","perl_release":"5.021004","date":"2014-09-20T00:00:00"},{"date":"2014-10-20T00:00:00","version":"3.51","dual_lived":1,"perl_release":"5.021005"},{"dual_lived":1,"version":"3.54","perl_release":"5.021007","date":"2014-12-20T00:00:00"},{"perl_release":"5.02101","version":"3.55","dual_lived":1,"date":"2015-03-20T00:00:00"},{"date":"2015-04-20T00:00:00","perl_release":"5.021011","dual_lived":1,"version":"3.56"},{"date":"2015-08-20T00:00:00","perl_release":"5.023002","version":"3.57","dual_lived":1},{"perl_release":"5.023003","dual_lived":1,"version":"3.58","date":"2015-09-20T00:00:00"},{"dual_lived":1,"version":"3.63","perl_release":"5.023008","date":"2016-02-20T00:00:00"},{"perl_release":"5.024001","version":"3.63_01","dual_lived":1,"date":"2017-01-14T00:00:00"},{"version":"3.64","dual_lived":1,"perl_release":"5.025002","date":"2016-06-20T00:00:00"},{"date":"2016-08-20T00:00:00","perl_release":"5.025004","version":"3.65","dual_lived":1},{"date":"2016-11-20T00:00:00","dual_lived":1,"version":"3.66","perl_release":"5.025007"},{"date":"2017-03-20T00:00:00","perl_release":"5.025011","version":"3.67","dual_lived":1},{"version":"3.68","dual_lived":1,"perl_release":"5.027002","date":"2017-07-20T00:00:00"},{"date":"2017-11-20T00:00:00","dual_lived":1,"version":"3.70","perl_release":"5.027006"},{"version":"3.71","dual_lived":1,"perl_release":"5.027007","date":"2017-12-20T00:00:00"},{"version":"3.72","dual_lived":1,"perl_release":"5.027008","date":"2018-01-20T00:00:00"},{"perl_release":"5.029005","dual_lived":1,"version":"3.76","date":"2018-11-20T00:00:00"},{"date":"2019-01-20T00:00:00","version":"3.77","dual_lived":1,"perl_release":"5.029007"},{"version":"3.78","dual_lived":1,"perl_release":"5.02901","date":"2019-04-20T00:00:00"},{"date":"2020-11-20T00:00:00","perl_release":"5.033004","dual_lived":1,"version":"3.79"},{"date":"2020-12-20T00:00:00","version":"3.80","dual_lived":1,"perl_release":"5.033005"},{"perl_release":"5.035001","version":"3.81","dual_lived":1,"date":"2021-06-20T00:00:00"},{"date":"2021-07-23T00:00:00","dual_lived":1,"version":"3.82","perl_release":"5.035002"},{"perl_release":"5.035007","dual_lived":1,"version":"3.83","date":"2021-12-20T00:00:00"},{"date":"2022-03-20T00:00:00","dual_lived":1,"version":"3.84","perl_release":"5.035010"},{"date":"2022-06-20T00:00:00","perl_release":"5.037001","version":"3.85","dual_lived":1},{"date":"2022-07-20T00:00:00","version":"3.86","dual_lived":1,"perl_release":"5.037002"},{"date":"2022-12-20T00:00:00","dual_lived":1,"version":"3.88","perl_release":"5.037007"},{"date":"2023-03-20T00:00:00","perl_release":"5.037010","version":"3.89","dual_lived":1},{"date":"2023-08-20T00:00:00","perl_release":"5.039002","version":"3.90","dual_lived":1}],"main_module":"Cwd"},"CPAN-Checksums":{"advisories":[{"severity":"medium","references":["https://metacpan.org/pod/CPAN::Checksums","https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/"],"affected_versions":["<=2.12"],"id":"CPANSA-CPAN-Checksums-2020-16155","reported":"2021-12-13","cves":["CVE-2020-16155"],"fixed_versions":[">=2.13"],"description":"The CPAN::Checksums package 2.12 for Perl does not uniquely define signed data.\n","distribution":"CPAN-Checksums"}],"versions":[{"version":"1.003","date":"2000-12-10T09:31:19"},{"date":"2000-12-11T08:49:05","version":"1.004"},{"date":"2000-12-11T10:20:16","version":"1.006"},{"date":"2000-12-11T13:38:18","version":"1.007"},{"date":"2000-12-13T11:24:09","version":"1.008"},{"date":"2002-03-31T20:27:49","version":"1.009"},{"date":"2002-10-06T17:22:35","version":"1.0"},{"version":"1.011","date":"2002-10-07T08:56:12"},{"date":"2003-02-02T10:26:00","version":"1.014"},{"date":"2003-02-03T15:44:57","version":"1.015"},{"date":"2003-02-03T19:21:46","version":"1.016"},{"version":"1.018","date":"2005-01-24T07:59:41"},{"version":"1.032","date":"2005-10-31T07:27:02"},{"date":"2005-11-11T07:16:04","version":"1.039"},{"version":"1.048","date":"2006-05-01T13:34:41"},{"date":"2006-05-09T03:30:39","version":"1.050"},{"version":"1.061","date":"2007-08-05T12:10:58"},{"date":"2007-10-09T03:09:45","version":"1.064"},{"date":"2008-05-17T05:26:24","version":"2.00"},{"version":"2.01","date":"2008-09-03T19:33:28"},{"version":"2.02","date":"2008-10-31T06:54:59"},{"date":"2009-09-20T01:50:36","version":"2.03"},{"version":"2.04","date":"2009-09-28T04:10:09"},{"version":"2.05","date":"2010-01-23T05:39:17"},{"date":"2010-10-24T12:13:44","version":"2.06"},{"version":"2.07","date":"2010-11-20T22:18:39"},{"date":"2011-08-30T06:32:02","version":"2.08"},{"version":"2.09","date":"2014-04-04T04:06:11"},{"date":"2015-04-11T05:48:38","version":"2.10"},{"date":"2016-04-09T05:42:27","version":"2.11"},{"date":"2016-06-14T02:42:03","version":"2.12"},{"date":"2021-11-23T16:57:18","version":"2.13"},{"version":"2.14","date":"2021-12-04T10:00:42"}],"main_module":"CPAN::Checksums"},"Linux-Statm-Tiny":{"versions":[{"date":"2015-01-05T12:19:47","version":"0.0100"},{"date":"2015-01-05T15:39:13","version":"0.0200"},{"version":"0.0201","date":"2015-01-05T18:23:59"},{"date":"2015-01-12T11:30:31","version":"0.0300"},{"date":"2015-03-27T13:57:06","version":"0.0400"},{"date":"2015-04-09T08:05:00","version":"0.0500"},{"version":"0.0501","date":"2015-05-05T16:02:45"},{"date":"2015-05-05T16:22:04","version":"0.0502"},{"date":"2015-05-06T13:21:39","version":"0.0503"},{"date":"2015-05-25T13:38:11","version":"0.0504"},{"version":"0.0505","date":"2015-06-23T17:07:45"},{"version":"0.0600","date":"2018-10-27T22:38:48"},{"version":"0.0601","date":"2019-02-17T18:30:34"},{"date":"2022-04-04T15:34:50","version":"0.0602"},{"version":"0.0603","date":"2022-04-04T15:41:28"},{"date":"2022-07-26T16:29:04","version":"0.0700"},{"date":"2025-03-31T13:52:42","version":"0.0701"}],"main_module":"Linux::Statm::Tiny","advisories":[{"reported":"2025-04-01","fixed_versions":[">=0.0701"],"cves":["CVE-2025-3051"],"distribution":"Linux-Statm-Tiny","description":"Linux::Statm::Tiny for Perl before 0.0701 allows untrusted code from the current working directory ('.') to be loaded similar to CVE-2016-1238. If an attacker can place a malicious file in current working directory, it may be loaded instead of the intended file, potentially leading to arbitrary code execution. Linux::Statm::Tiny uses Mite to produce the affected code section due to CVE-2025-30672","id":"CPANSA-Linux-Statm-Tiny-2025-3051","references":["https://blogs.perl.org/users/todd_rinaldo/2016/11/what-happened-to-dot-in-inc.html","https://metacpan.org/release/RRWO/Linux-Statm-Tiny-0.0700/source/lib/Linux/Statm/Tiny/Mite.pm#L82","https://metacpan.org/release/RRWO/Linux-Statm-Tiny-0.0701/changes"],"affected_versions":["<0.0701"],"severity":null}]},"Compress-Raw-Bzip2":{"advisories":[{"reported":"2010-01-27","cves":["CVE-2010-0405"],"fixed_versions":[">=2.031"],"description":"Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.\n","distribution":"Compress-Raw-Bzip2","id":"CPANSA-Compress-Raw-Bzip2-2010-0405","references":["https://metacpan.org/changes/distribution/Compress-Raw-Bzip2"],"affected_versions":["<2.031"]},{"severity":null,"affected_versions":["<2.018"],"references":["http://security.gentoo.org/glsa/glsa-200908-07.xml","https://bugs.gentoo.org/show_bug.cgi?id=281955","https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00999.html","https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00982.html","http://www.securityfocus.com/bid/36082","http://secunia.com/advisories/36386","https://bugzilla.redhat.com/show_bug.cgi?id=518278","http://secunia.com/advisories/36415","https://exchange.xforce.ibmcloud.com/vulnerabilities/52628"],"id":"CPANSA-Compress-Raw-Bzip2-2009-1884","description":"Off-by-one error in the bzinflate function in Bzip2.xs in the Compress-Raw-Bzip2 module before 2.018 for Perl allows context-dependent attackers to cause a denial of service (application hang or crash) via a crafted bzip2 compressed stream that triggers a buffer overflow, a related issue to CVE-2009-1391.\n","distribution":"Compress-Raw-Bzip2","reported":"2009-08-19","cves":["CVE-2009-1884"],"fixed_versions":[">=2.018"]}],"main_module":"Compress::Raw::Bzip2","versions":[{"version":"2.000_10","date":"2006-03-13T16:14:00"},{"date":"2006-04-15T21:23:09","version":"2.000_11"},{"date":"2006-05-17T12:43:30","version":"2.000_12"},{"version":"2.000_13","date":"2006-06-20T12:43:47"},{"version":"2.000_14","date":"2006-10-26T14:15:45"},{"date":"2006-11-01T10:35:27","version":"2.001"},{"version":"2.002","date":"2006-12-29T20:40:23"},{"date":"2007-01-02T13:03:45","version":"2.003"},{"version":"2.004","date":"2007-03-03T15:50:04"},{"date":"2007-07-01T00:06:51","version":"2.005"},{"date":"2007-09-01T19:44:48","version":"2.006"},{"version":"2.008","date":"2007-11-10T11:59:25"},{"date":"2008-04-20T14:41:25","version":"2.009"},{"date":"2008-05-05T17:18:15","version":"2.010"},{"date":"2008-05-17T11:16:17","version":"2.011"},{"version":"2.012","date":"2008-07-15T22:23:56"},{"date":"2008-09-02T20:20:05","version":"2.014"},{"version":"2.015","date":"2008-09-03T20:47:15"},{"date":"2009-04-04T09:47:36","version":"2.017"},{"date":"2009-05-03T16:26:57","version":"2.018"},{"version":"2.019","date":"2009-05-04T09:42:06"},{"version":"2.020","date":"2009-06-03T17:48:18"},{"date":"2009-08-30T20:25:24","version":"2.021"},{"version":"2.023","date":"2009-11-09T23:25:19"},{"version":"2.024","date":"2010-01-09T17:56:12"},{"date":"2010-03-28T12:56:33","version":"2.025"},{"date":"2010-04-07T19:49:29","version":"2.026"},{"version":"2.027","date":"2010-04-24T19:15:32"},{"version":"2.030","date":"2010-07-24T14:29:17"},{"date":"2010-09-21T19:44:52","version":"2.031"},{"version":"2.032","date":"2011-01-06T11:26:00"},{"version":"2.033","date":"2011-01-11T14:02:05"},{"version":"2.034","date":"2011-05-02T21:50:15"},{"date":"2011-05-07T08:30:09","version":"2.035"},{"date":"2011-06-18T21:45:13","version":"2.036"},{"version":"2.037","date":"2011-06-22T07:17:56"},{"date":"2011-10-28T14:27:59","version":"2.039"},{"version":"2.040","date":"2011-10-28T22:18:59"},{"date":"2011-11-17T23:44:58","version":"2.042"},{"date":"2011-11-20T21:31:34","version":"2.043"},{"date":"2011-12-03T22:48:47","version":"2.044"},{"date":"2011-12-04T19:19:58","version":"2.045"},{"date":"2012-01-28T23:26:44","version":"2.047"},{"date":"2012-01-29T16:58:55","version":"2.048"},{"version":"2.049","date":"2012-02-18T15:56:34"},{"version":"2.052","date":"2012-04-29T12:40:06"},{"version":"2.055","date":"2012-08-05T20:35:37"},{"date":"2012-11-10T19:08:29","version":"2.057"},{"version":"2.058","date":"2012-11-12T22:14:16"},{"date":"2012-11-25T13:38:19","version":"2.059"},{"version":"2.060","date":"2013-01-07T20:02:08"},{"date":"2013-05-27T09:54:30","version":"2.061"},{"date":"2013-08-12T19:06:20","version":"2.062"},{"version":"2.063","date":"2013-11-02T17:14:54"},{"version":"2.064","date":"2014-02-01T23:19:50"},{"version":"2.066","date":"2014-09-21T12:40:58"},{"date":"2014-12-08T15:12:21","version":"2.067"},{"version":"2.068","date":"2014-12-23T17:44:34"},{"date":"2015-09-27T14:33:57","version":"2.069"},{"date":"2016-12-28T23:07:42","version":"2.070"},{"version":"2.072","date":"2017-02-12T20:39:20"},{"version":"2.073","date":"2017-02-19T20:35:17"},{"date":"2017-02-19T22:11:17","version":"2.074"},{"version":"2.080","date":"2018-04-03T18:20:04"},{"date":"2018-04-08T15:01:21","version":"2.081"},{"version":"2.083","date":"2018-12-30T22:38:05"},{"version":"2.084","date":"2019-01-06T08:56:52"},{"version":"2.086","date":"2019-03-31T19:13:22"},{"version":"2.087","date":"2019-08-10T18:11:44"},{"date":"2019-11-03T08:56:50","version":"2.088"},{"date":"2019-11-03T19:53:42","version":"2.089"},{"date":"2019-11-09T18:35:48","version":"2.090"},{"date":"2019-11-23T19:34:12","version":"2.091"},{"version":"2.092","date":"2019-12-04T22:08:25"},{"version":"2.093","date":"2019-12-07T16:05:12"},{"version":"2.094","date":"2020-07-13T10:53:44"},{"version":"2.095","date":"2020-07-20T19:13:40"},{"date":"2020-07-31T20:50:12","version":"2.096"},{"date":"2021-01-07T13:00:00","version":"2.100"},{"version":"2.101","date":"2021-02-20T14:08:53"},{"version":"2.103","date":"2022-04-03T19:48:28"},{"version":"2.201","date":"2022-06-25T09:02:32"},{"date":"2023-02-08T19:23:39","version":"2.204"},{"version":"2.205","date":"2023-07-16T15:36:44"},{"version":"2.206","date":"2023-07-25T15:36:59"},{"date":"2024-02-18T22:19:11","version":"2.207"},{"version":"2.208","date":"2024-02-19T09:28:45"},{"date":"2024-02-20T13:23:07","version":"2.209"},{"version":"2.210","date":"2024-02-26T09:33:37"},{"version":"2.211","date":"2024-04-06T13:40:27"},{"version":"2.212","date":"2024-04-27T12:52:31"},{"version":"2.213","date":"2024-08-28T15:29:28"},{"date":"2012-07-20T00:00:00","perl_release":"5.017002","version":"2.05201","dual_lived":1},{"date":"2023-07-02T00:00:00","perl_release":"5.038","version":"2.204_001","dual_lived":1}]},"MDK-Common":{"advisories":[{"id":"CPANSA-MDK-Common-2009-0912","reported":"2009-03-16","cves":["CVE-2009-0912"],"fixed_versions":[],"distribution":"MDK-Common","description":"perl-MDK-Common 1.1.11 and 1.1.24, 1.2.9 through 1.2.14, and possibly other versions, in Mandriva Linux does not properly handle strings when writing them to configuration files, which allows attackers to gain privileges via \"special characters\" in unspecified vectors.'\n","severity":null,"affected_versions":["=1.1.11","=1.1.24",">=1.2.9,<=1.2.14"],"references":["http://www.securityfocus.com/bid/34089","http://www.vupen.com/english/advisories/2009/0688","http://www.mandriva.com/security/advisories?name=MDVSA-2009:072","https://exchange.xforce.ibmcloud.com/vulnerabilities/49220"]}],"main_module":"MDK::Common","versions":[{"date":"2012-09-14T16:23:25","version":"1.2.29"},{"version":"v1.2.30","date":"2014-05-06T17:14:10"},{"date":"2017-10-27T22:31:26","version":"v1.2.32"},{"version":"v1.2.33","date":"2017-10-27T23:18:48"},{"date":"2017-10-28T01:09:39","version":"v1.2.34"},{"date":"2017-10-28T03:37:17","version":"v1.2.34.1"},{"date":"2017-10-28T04:28:13","version":"v1.2.34.2"}]},"Zonemaster-Backend":{"advisories":[{"distribution":"Zonemaster-Backend","description":"When running the API behind a reverse proxy on the same machine (like it is using the configuration example provided by the GUI) the remote ip might always be localhost even if the query was done from elsewher\n","cves":[],"reported":"2021-08-05","fixed_versions":[">=7.0.0"],"id":"CPANSA-Zonemaster-Backend-2021-001","references":["https://github.com/zonemaster/zonemaster-backend/issues/838","https://metacpan.org/dist/Zonemaster-Backend/changes"],"affected_versions":["<7.0.0"],"severity":null},{"reported":"2015-01-28","cves":[],"fixed_versions":[">=1.0.1"],"description":"Potential SQL injection.\n","distribution":"Zonemaster-Backend","id":"CPANSA-Zonemaster-Backend-2015-001","affected_versions":["<1.0.1"],"references":["https://github.com/zonemaster/zonemaster-backend/issues/25","https://metacpan.org/dist/Zonemaster-Backend/changes"],"severity":null}],"versions":[{"version":"2.0.0","date":"2017-11-02T13:57:24"},{"date":"2018-01-12T17:25:15","version":"2.0.1"},{"date":"2018-02-23T13:09:41","version":"2.0.2"},{"version":"2.1.0","date":"2018-06-25T08:43:15"},{"date":"2019-05-24T07:07:47","version":"4.0.0"},{"version":"4.0.1","date":"2019-05-31T16:42:26"},{"version":"5.0.0","date":"2020-05-01T14:49:55"},{"date":"2020-05-15T12:59:00","version":"5.0.1"},{"version":"5.0.2","date":"2020-05-22T07:31:56"},{"version":"6.0.0","date":"2020-11-09T09:49:51"},{"date":"2020-11-10T10:02:13","version":"6.0.1"},{"date":"2020-11-18T09:08:50","version":"6.0.2"},{"version":"6.1.0","date":"2021-02-09T11:02:57"},{"date":"2021-05-31T20:39:03","version":"6.2.0"},{"version":"7.0.0","date":"2021-09-18T14:05:03"},{"version":"8.0.0","date":"2021-12-06T00:20:51"},{"version":"8.1.0","date":"2021-12-20T10:08:13"},{"version":"9.0.0","date":"2022-06-10T11:39:25"},{"date":"2022-07-08T08:40:31","version":"9.0.1"},{"date":"2022-12-19T09:29:40","version":"10.0.0"},{"version":"10.0.1","date":"2023-01-31T16:06:19"},{"version":"10.0.2","date":"2023-03-01T17:37:05"},{"version":"11.0.0","date":"2023-06-21T16:14:40"},{"version":"11.0.1","date":"2023-08-08T02:40:32"},{"date":"2023-09-08T09:18:30","version":"11.0.2"},{"date":"2024-03-18T15:59:50","version":"11.1.0"},{"date":"2024-03-28T10:49:24","version":"11.1.1"},{"date":"2024-07-01T15:45:21","version":"11.2.0"},{"version":"11.3.0","date":"2024-12-09T13:52:41"},{"date":"2025-03-04T21:47:49","version":"11.4.0"}],"main_module":"Zonemaster::Backend"},"Module-Metadata":{"main_module":"Module::Metadata","versions":[{"date":"2010-07-06T21:16:54","version":"1.000000"},{"date":"2010-07-08T23:56:47","version":"1.000001"},{"date":"2010-12-10T17:07:09","version":"1.000002"},{"version":"1.000003","date":"2011-01-07T02:35:06"},{"version":"1.000004","date":"2011-02-03T07:55:40"},{"date":"2011-08-03T01:41:05","version":"1.000005"},{"version":"1.000006","date":"2011-08-29T19:48:33"},{"version":"1.000007","date":"2011-09-07T16:01:55"},{"date":"2012-02-08T03:31:54","version":"1.000008"},{"date":"2012-02-08T17:34:49","version":"1.000009"},{"version":"1.000010","date":"2012-07-29T19:21:55"},{"version":"1.000010_001","date":"2012-08-16T00:07:05"},{"date":"2012-08-16T00:15:02","version":"1.000010_002"},{"date":"2012-08-16T04:54:55","version":"1.000010_003"},{"date":"2012-08-16T19:57:31","version":"1.000011"},{"version":"1.000012","date":"2013-05-05T04:59:03"},{"date":"2013-05-08T23:00:33","version":"1.000013"},{"version":"1.000014","date":"2013-05-09T09:02:22"},{"version":"1.000015","date":"2013-08-21T15:46:56"},{"version":"1.000016","date":"2013-08-22T05:59:11"},{"date":"2013-09-11T01:06:02","version":"1.000017"},{"date":"2013-09-11T16:28:24","version":"1.000018"},{"version":"1.000019","date":"2013-10-06T16:50:13"},{"version":"1.000020","date":"2014-04-27T20:57:08"},{"date":"2014-04-29T18:29:51","version":"1.000021"},{"version":"1.000022","date":"2014-04-29T22:06:21"},{"date":"2014-06-02T02:39:20","version":"1.000023"},{"date":"2014-06-03T01:54:30","version":"1.000024"},{"date":"2015-01-04T18:57:40","version":"1.000025"},{"version":"1.000026","date":"2015-01-17T19:23:52"},{"date":"2015-04-11T00:23:53","version":"1.000027"},{"version":"1.000028","date":"2015-09-11T04:25:25"},{"version":"1.000029","date":"2015-09-11T16:26:57"},{"version":"1.000030","date":"2015-11-20T03:05:34"},{"version":"1.000031","date":"2015-11-24T03:59:40"},{"version":"1.000032","date":"2016-04-23T22:38:13"},{"version":"1.000033","date":"2016-07-24T23:34:48"},{"date":"2018-07-19T20:31:14","version":"1.000034"},{"version":"1.000035","date":"2019-04-18T02:44:48"},{"version":"1.000036","date":"2019-04-18T18:27:14"},{"date":"2019-09-07T18:34:09","version":"1.000037"},{"version":"1.000038","date":"2023-04-28T11:27:07"},{"date":"2011-08-20T00:00:00","perl_release":"5.015002","version":"1.000005_01","dual_lived":1}],"advisories":[{"reviewed_by":[{"date":"2022-07-11","email":"rrwo@cpan.org","name":"Robert Rothenberg"}],"severity":"critical","fixed_versions":[">=1.000015"],"reported":"2020-01-28","cves":["CVE-2013-1437"],"description":"Eval injection vulnerability in the Module-Metadata module before 1.000015 for Perl allows remote attackers to execute arbitrary Perl code via the $Version value.\n","distribution":"Module-Metadata","id":"CPANSA-Module-Metadata-2013-1437","affected_versions":["<1.000015"],"references":["http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114912.html","https://metacpan.org/changes/distribution/Module-Metadata","http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114904.html"]}]},"YAML-LibYAML":{"versions":[{"version":"0.01","date":"2007-05-11T21:37:19"},{"date":"2007-05-15T06:37:59","version":"0.02"},{"version":"0.03","date":"2007-05-19T22:23:53"},{"date":"2007-05-21T05:19:05","version":"0.04"},{"version":"0.05","date":"2007-05-21T07:45:35"},{"date":"2007-05-23T06:56:11","version":"0.06"},{"version":"0.07","date":"2007-05-23T07:10:14"},{"date":"2007-05-26T04:58:43","version":"0.08"},{"version":"0.09","date":"2007-05-28T07:47:31"},{"version":"0.10","date":"2007-05-28T10:30:28"},{"date":"2007-05-30T00:30:09","version":"0.11"},{"date":"2007-05-30T08:13:24","version":"0.12"},{"version":"0.14","date":"2007-05-30T09:38:37"},{"date":"2007-05-31T07:48:16","version":"0.15"},{"date":"2007-05-31T21:05:50","version":"0.16"},{"date":"2007-06-07T02:55:10","version":"0.17"},{"version":"0.18","date":"2007-06-18T01:35:48"},{"date":"2007-06-18T08:06:43","version":"0.19"},{"date":"2007-06-18T23:34:20","version":"0.20"},{"version":"0.21","date":"2007-06-21T23:27:47"},{"date":"2007-06-22T07:42:47","version":"0.22"},{"version":"0.23","date":"2007-06-23T01:17:58"},{"date":"2007-06-24T18:37:51","version":"0.24"},{"date":"2007-06-25T01:40:09","version":"0.25"},{"date":"2007-06-26T21:00:04","version":"0.26"},{"version":"0.27","date":"2008-06-07T05:37:26"},{"date":"2008-11-12T07:09:30","version":"0.29"},{"date":"2009-01-11T11:00:54","version":"0.30"},{"version":"0.31","date":"2009-01-12T09:26:53"},{"version":"0.32","date":"2009-01-12T09:34:50"},{"date":"2010-04-15T01:01:10","version":"0.33"},{"version":"0.34","date":"2010-09-23T22:43:36"},{"date":"2011-04-03T16:41:03","version":"0.35"},{"date":"2011-09-29T18:10:52","version":"0.37"},{"date":"2012-01-04T06:58:09","version":"0.38"},{"version":"0.39","date":"2013-02-12T02:09:38"},{"version":"0.40","date":"2013-03-12T18:07:29"},{"date":"2013-03-13T17:36:09","version":"0.41"},{"date":"2014-07-11T22:30:03","version":"0.42"},{"date":"2014-07-12T17:05:47","version":"0.43"},{"version":"0.44","date":"2014-07-13T22:24:47"},{"date":"2014-08-04T08:23:39","version":"0.45"},{"date":"2014-08-05T17:33:54","version":"0.46"},{"date":"2014-08-09T07:30:51","version":"0.47"},{"version":"0.48","date":"2014-08-16T04:07:46"},{"version":"0.49","date":"2014-08-16T14:31:04"},{"version":"0.50","date":"2014-08-16T19:58:18"},{"date":"2014-08-16T21:29:48","version":"0.51"},{"date":"2014-08-23T04:04:49","version":"0.52"},{"date":"2014-11-28T17:22:06","version":"0.53"},{"version":"0.54","date":"2014-11-29T19:48:26"},{"version":"0.55","date":"2014-12-23T01:27:43"},{"date":"2015-01-16T03:23:05","version":"0.56"},{"version":"0.57","date":"2015-01-16T04:06:00"},{"date":"2015-01-21T05:02:46","version":"0.58"},{"version":"0.59","date":"2015-01-26T23:05:30"},{"version":"0.60","date":"2016-02-09T19:36:50"},{"version":"0.61","date":"2016-02-20T18:05:06"},{"date":"2016-02-22T15:47:18","version":"0.62"},{"date":"2016-07-03T17:33:17","version":"0.62_001"},{"version":"0.62_002","date":"2016-07-03T17:40:25"},{"date":"2016-07-08T14:41:45","version":"0.63"},{"date":"2016-09-08T09:56:51","version":"0.71"},{"version":"0.73","date":"2016-09-13T14:44:45"},{"version":"0.63_001","date":"2017-01-03T04:10:44"},{"date":"2017-04-03T18:56:26","version":"0.63_002"},{"version":"0.64","date":"2017-04-07T18:32:36"},{"date":"2017-05-18T21:10:50","version":"0.65"},{"version":"0.65_001","date":"2017-08-13T11:49:59"},{"version":"0.66","date":"2017-08-17T18:07:26"},{"date":"2017-11-10T21:07:40","version":"0.66_001"},{"version":"0.66_002","date":"2017-11-14T20:03:09"},{"date":"2017-11-15T18:00:42","version":"0.67"},{"version":"0.67_001","date":"2017-12-16T21:50:01"},{"date":"2017-12-18T19:01:27","version":"0.68"},{"date":"2017-12-20T18:38:40","version":"0.68_001"},{"date":"2017-12-22T11:40:39","version":"0.68_002"},{"date":"2017-12-26T17:37:54","version":"0.69"},{"version":"0.69_001","date":"2018-06-07T20:16:52"},{"date":"2018-06-09T19:53:37","version":"0.70"},{"date":"2018-06-27T17:14:44","version":"0.70_001"},{"date":"2018-07-08T15:04:37","version":"0.72"},{"date":"2018-08-31T15:38:28","version":"0.72_01"},{"date":"2018-09-01T01:07:45","version":"0.74"},{"date":"2018-10-14T14:09:48","version":"0.74_001"},{"date":"2018-11-03T13:17:49","version":"0.75"},{"version":"0.75_001","date":"2018-12-16T17:28:49"},{"version":"0.76","date":"2018-12-30T19:11:20"},{"date":"2019-03-13T18:47:41","version":"0.76_001"},{"date":"2019-04-15T20:56:14","version":"0.77"},{"date":"2019-05-15T18:20:47","version":"0.77_001"},{"date":"2019-05-18T16:36:19","version":"0.78"},{"date":"2019-05-30T16:01:02","version":"0.78_001"},{"version":"0.78_002","date":"2019-06-10T11:10:47"},{"date":"2019-06-11T19:36:40","version":"0.79"},{"date":"2019-08-21T16:49:31","version":"0.79_001"},{"version":"0.80","date":"2019-08-22T11:18:19"},{"version":"0.81","date":"2020-01-27T22:06:22"},{"date":"2020-05-02T18:40:13","version":"0.82"},{"version":"0.82_001","date":"2021-05-02T00:16:51"},{"version":"0.83","date":"2021-05-08T21:52:55"},{"version":"0.84","date":"2022-09-03T19:20:07"},{"version":"0.84_001","date":"2022-09-09T15:31:45"},{"version":"0.84_002","date":"2022-09-09T18:12:56"},{"date":"2022-09-09T19:01:06","version":"0.84_003"},{"date":"2022-09-12T12:21:48","version":"0.85"},{"version":"0.86","date":"2023-01-26T02:35:03"},{"date":"2023-05-04T10:47:26","version":"0.86_001"},{"date":"2023-05-04T19:38:30","version":"0.87"},{"version":"0.88","date":"2023-05-12T12:28:46"},{"version":"0.88_001","date":"2024-01-24T21:55:26"},{"version":"0.89","date":"2024-01-27T00:45:43"},{"version":"0.89_001","date":"2024-05-26T13:07:57"},{"date":"2024-09-06T21:47:43","version":"0.90"},{"date":"2024-09-06T22:09:50","version":"v0.901.0"},{"date":"2024-09-09T20:42:09","version":"v0.901.1"},{"date":"2024-09-20T19:48:00","version":"v0.902.0"},{"date":"2025-01-12T21:19:33","version":"v0.902.1"},{"date":"2025-01-26T01:28:39","version":"v0.902.2"},{"date":"2025-01-26T15:02:24","version":"v0.902.3"},{"version":"v0.902.4","date":"2025-02-02T22:21:19"},{"version":"v0.903.0","date":"2025-02-02T23:15:49"},{"date":"2025-05-01T14:17:45","version":"v0.903.1"},{"version":"v0.903.2","date":"2025-05-03T08:45:21"},{"date":"2025-05-03T16:35:27","version":"v0.903.3"},{"version":"v0.903.4","date":"2025-05-03T19:49:05"},{"version":"v0.904.0","date":"2025-05-08T12:21:43"}],"main_module":"YAML::LibYAML","advisories":[{"affected_versions":["<0.69"],"references":["https://github.com/ingydotnet/yaml-libyaml-pm/issues/45"],"severity":null,"distribution":"YAML-LibYAML","description":"Need SafeLoad and SafeDump analog to python\n","reported":"2016-03-10","fixed_versions":[">=0.69"],"cves":[],"id":"CPANSA-YAML-LibYAML-2016-01"},{"severity":null,"references":["http://www.openwall.com/lists/oss-security/2014/11/29/3","http://www.openwall.com/lists/oss-security/2014/11/28/8","https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2","http://www.securityfocus.com/bid/71349","http://secunia.com/advisories/59947","https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure","http://secunia.com/advisories/60944","http://www.openwall.com/lists/oss-security/2014/11/28/1","http://linux.oracle.com/errata/ELSA-2015-0100.html","http://secunia.com/advisories/62723","http://secunia.com/advisories/62705","http://secunia.com/advisories/62774","http://www.ubuntu.com/usn/USN-2461-2","http://www.ubuntu.com/usn/USN-2461-3","http://www.ubuntu.com/usn/USN-2461-1","http://rhn.redhat.com/errata/RHSA-2015-0100.html","http://www.debian.org/security/2014/dsa-3103","http://rhn.redhat.com/errata/RHSA-2015-0112.html","http://www.debian.org/security/2014/dsa-3102","http://www.debian.org/security/2014/dsa-3115","http://rhn.redhat.com/errata/RHSA-2015-0260.html","http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html","http://www.mandriva.com/security/advisories?name=MDVSA-2015:060","http://www.mandriva.com/security/advisories?name=MDVSA-2014:242","http://advisories.mageia.org/MGASA-2014-0508.html","http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html","http://secunia.com/advisories/62176","http://secunia.com/advisories/62174","http://secunia.com/advisories/62164","https://exchange.xforce.ibmcloud.com/vulnerabilities/99047","https://puppet.com/security/cve/cve-2014-9130"],"affected_versions":["<0.53"],"id":"CPANSA-YAML-LibYAML-2014-9130","distribution":"YAML-LibYAML","description":"scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.\n","reported":"2014-12-08","fixed_versions":[">=0.54"],"cves":["CVE-2014-9130"]},{"references":["https://bugzilla.redhat.com/show_bug.cgi?id=801738","https://rt.cpan.org/Public/Bug/Display.html?id=46507","http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077023.html","http://www.openwall.com/lists/oss-security/2012/03/10/4","http://www.openwall.com/lists/oss-security/2012/03/09/6","http://www.debian.org/security/2012/dsa-2432","http://www.securityfocus.com/bid/52381","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661548","http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077782.html","https://rt.cpan.org/Public/Bug/Display.html?id=75365","http://secunia.com/advisories/48317","http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077004.html","http://lists.opensuse.org/opensuse-updates/2012-08/msg00029.html","http://secunia.com/advisories/50277","http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html","https://exchange.xforce.ibmcloud.com/vulnerabilities/73856"],"affected_versions":[">0.38,<0.57"],"severity":null,"description":"Multiple format string vulnerabilities in the error reporting functionality in the YAML::LibYAML (aka YAML-LibYAML and perl-YAML-LibYAML) module 0.38 for Perl allow remote attackers to cause a denial of service (process crash) via format string specifiers in a (1) YAML stream to the Load function, (2) YAML node to the load_node function, (3) YAML mapping to the load_mapping function, or (4) YAML sequence to the load_sequence function.\n","distribution":"YAML-LibYAML","fixed_versions":[">=0.57"],"reported":"2012-09-09","cves":["CVE-2012-1152"],"id":"CPANSA-YAML-LibYAML-2012-1152"},{"references":["https://github.com/ingydotnet/yaml-libyaml-pm/issues/120","https://github.com/ingydotnet/yaml-libyaml-pm/pull/121","https://github.com/ingydotnet/yaml-libyaml-pm/pull/122"],"affected_versions":["<0.903.0"],"severity":null,"distribution":"YAML-LibYAML","description":"Security fix: Use 3-arg form of open in LoadFile (issue#120 PR#121)","reported":null,"fixed_versions":[">=0.903.0"],"cves":[],"id":"CPANSA-YAML-LibYAML-2025-001"}]},"Data-FormValidator":{"advisories":[{"severity":null,"references":["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629511","http://www.openwall.com/lists/oss-security/2011/06/13/13","https://bugzilla.redhat.com/show_bug.cgi?id=712694","http://www.openwall.com/lists/oss-security/2011/06/12/3","http://www.securityfocus.com/bid/48167","https://rt.cpan.org/Public/Bug/Display.html?id=61792","http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065416.html","http://www.openwall.com/lists/oss-security/2011/06/13/5"],"affected_versions":["<=4.66"],"id":"CPANSA-Data-FormValidator-2011-2201","distribution":"Data-FormValidator","description":"The Data::FormValidator module 4.66 and earlier for Perl, when untaint_all_constraints is enabled, does not properly preserve the taint attribute of data, which might allow remote attackers to bypass the taint protection mechanism via form input.\n","reported":"2011-09-14","cves":["CVE-2011-2201"],"fixed_versions":[">4.66"]}],"main_module":"Data::FormValidator","versions":[{"date":"2001-06-19T21:43:01","version":"1.3"},{"date":"2001-06-22T16:36:08","version":"1.4"},{"date":"2001-06-25T17:02:43","version":"1.4"},{"date":"2001-06-28T15:13:01","version":"1.5"},{"version":"v1.5.1","date":"2001-07-18T14:23:17"},{"date":"2001-09-23T22:42:22","version":"1.6"},{"date":"2001-11-03T18:16:00","version":"1.7"},{"date":"2002-02-14T22:45:46","version":"1.8"},{"date":"2002-02-18T02:20:12","version":"1.9"},{"version":"1.10","date":"2002-04-21T13:42:36"},{"date":"2002-06-29T21:04:14","version":"1.11"},{"date":"2002-10-07T02:06:39","version":"1.91"},{"date":"2002-12-23T23:36:37","version":"1.92"},{"version":"1.93","date":"2003-03-08T13:10:33"},{"date":"2003-03-23T03:01:57","version":"2.00"},{"date":"2003-04-02T15:18:15","version":"2.01"},{"version":"2.02","date":"2003-04-09T15:54:50"},{"date":"2003-04-10T16:12:40","version":"2.03"},{"date":"2003-04-12T02:58:35","version":"2.04"},{"version":"2.10","date":"2003-04-20T22:23:44"},{"version":"2.10","date":"2003-04-24T02:51:03"},{"version":"3.00","date":"2003-05-11T21:29:55"},{"date":"2003-05-16T04:06:05","version":"3.01"},{"date":"2003-05-26T23:18:18","version":"3.1"},{"date":"2003-05-27T19:41:01","version":"3.11"},{"date":"2003-06-23T01:27:03","version":"3.12"},{"date":"2003-11-02T21:19:10","version":"3.13"},{"version":"3.14","date":"2003-11-03T17:59:41"},{"date":"2003-11-30T20:36:41","version":"3.15"},{"version":"3.49_1","date":"2004-01-04T01:37:01"},{"version":"3.50","date":"2004-01-12T22:04:27"},{"date":"2004-02-27T04:19:47","version":"3.51"},{"date":"2004-03-21T17:42:11","version":"3.52"},{"version":"3.53","date":"2004-03-23T02:33:53"},{"version":"3.54","date":"2004-03-24T14:55:49"},{"date":"2004-04-17T02:30:02","version":"3.56"},{"date":"2004-04-22T02:26:41","version":"3.57"},{"date":"2004-05-05T21:55:00","version":"3.58"},{"date":"2004-07-02T17:48:51","version":"3.59"},{"version":"3.61","date":"2004-09-28T02:25:35"},{"version":"3.62","date":"2004-10-09T04:00:51"},{"date":"2004-11-17T22:27:13","version":"3.63"},{"date":"2005-05-20T01:25:45","version":"4.00_01"},{"date":"2005-07-03T19:37:11","version":"4.00_02"},{"version":"3.70","date":"2005-07-20T02:07:36"},{"version":"3.71","date":"2005-07-31T17:36:02"},{"version":"4.00","date":"2005-08-14T16:09:26"},{"date":"2005-08-20T18:20:14","version":"4.01"},{"version":"4.02","date":"2005-09-01T02:31:29"},{"date":"2005-12-23T01:00:49","version":"4.10"},{"version":"4.11","date":"2006-01-03T23:49:53"},{"date":"2006-01-06T02:14:25","version":"4.12"},{"date":"2006-02-10T02:48:33","version":"4.13"},{"version":"4.14","date":"2006-02-17T18:48:14"},{"date":"2006-06-13T01:12:23","version":"4.20"},{"date":"2006-07-01T15:42:37","version":"4.21_01"},{"version":"4.30","date":"2006-07-11T01:45:51"},{"date":"2006-08-21T23:43:58","version":"4.40"},{"version":"4.49_1","date":"2006-10-03T18:16:57"},{"version":"4.50","date":"2006-12-05T02:41:19"},{"version":"4.51","date":"2007-07-14T03:36:00"},{"version":"4.52","date":"2007-10-19T19:41:46"},{"version":"4.50","date":"2007-10-20T20:02:19"},{"version":"4.54","date":"2007-10-21T13:30:20"},{"version":"4.55","date":"2007-10-21T15:50:42"},{"version":"4.56","date":"2007-10-31T16:49:55"},{"date":"2007-11-02T02:55:19","version":"4.57"},{"version":"4.60","date":"2008-06-16T18:28:54"},{"version":"4.61","date":"2008-06-16T18:46:47"},{"version":"4.62","date":"2009-01-03T17:14:18"},{"date":"2009-01-03T17:49:48","version":"4.63"},{"version":"4.65","date":"2009-12-31T03:22:00"},{"version":"4.66","date":"2010-02-24T14:33:48"},{"date":"2011-11-12T02:18:45","version":"4.67"},{"date":"2011-11-12T03:11:55","version":"4.70"},{"date":"2012-10-02T20:40:09","version":"4.71"},{"version":"4.80","date":"2012-11-01T15:14:05"},{"date":"2013-07-19T12:31:06","version":"4.81"},{"version":"4.82","date":"2017-02-23T15:15:37"},{"version":"4.83","date":"2017-02-23T16:39:53"},{"date":"2017-02-25T15:12:25","version":"4.84"},{"version":4.85,"date":"2017-02-25T20:34:08"},{"version":4.86,"date":"2017-03-26T19:39:49"},{"version":4.88,"date":"2017-08-28T12:41:42"}]},"Crypt-DSA":{"advisories":[{"affected_versions":["<1.18"],"references":["https://rt.cpan.org/Public/Bug/Display.html?id=71421","https://bugzilla.redhat.com/show_bug.cgi?id=743567","http://www.openwall.com/lists/oss-security/2011/10/05/9","http://www.openwall.com/lists/oss-security/2011/10/05/5","http://secunia.com/advisories/46275","http://www.securityfocus.com/bid/49928","http://osvdb.org/76025"],"severity":null,"description":"The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack.\n","distribution":"Crypt-DSA","reported":"2011-10-10","fixed_versions":[],"cves":["CVE-2011-3599"],"id":"CPANSA-Crypt-DSA-2011-3599"}],"versions":[{"version":"0.02","date":"2001-03-24T01:21:08"},{"date":"2001-04-07T07:44:41","version":"0.03"},{"version":"0.10","date":"2001-04-23T00:09:38"},{"version":"0.11","date":"2001-05-02T23:26:09"},{"date":"2001-05-04T06:12:08","version":"0.12"},{"date":"2005-05-26T16:19:59","version":"0.13"},{"date":"2006-05-08T18:43:01","version":"0.14"},{"date":"2009-08-19T11:11:31","version":"0.15_01"},{"version":"1.16","date":"2009-09-11T12:47:36"},{"date":"2011-06-17T01:49:57","version":"1.17"},{"version":"1.18","date":"2024-12-04T04:25:53"},{"date":"2024-12-04T13:54:34","version":"1.18"},{"version":"1.19","date":"2024-12-04T14:50:02"}],"main_module":"Crypt::DSA"},"Crypt-JWT":{"versions":[{"date":"2015-07-02T22:24:01","version":"0.004"},{"version":"0.005","date":"2015-07-02T22:54:29"},{"version":"0.010","date":"2015-07-07T19:43:45"},{"date":"2015-10-22T07:08:48","version":"0.011"},{"date":"2016-05-02T17:33:01","version":"0.012"},{"date":"2016-05-03T07:10:15","version":"0.013"},{"date":"2016-05-04T05:48:13","version":"0.014"},{"date":"2016-05-12T05:38:49","version":"0.015"},{"version":"0.016","date":"2016-05-12T08:03:49"},{"date":"2016-06-03T10:17:48","version":"0.017"},{"version":"0.018","date":"2016-08-31T19:49:41"},{"version":"0.019","date":"2018-01-26T16:07:54"},{"version":"0.020","date":"2018-02-02T15:02:28"},{"version":"0.021","date":"2018-03-15T11:59:25"},{"date":"2018-06-24T20:29:50","version":"0.022"},{"version":"0.023","date":"2018-09-01T16:09:10"},{"version":"0.024","date":"2019-03-26T11:11:25"},{"date":"2019-09-29T15:23:58","version":"0.025"},{"date":"2020-02-02T08:44:56","version":"0.026"},{"date":"2020-06-04T22:35:39","version":"0.027"},{"version":"0.028","date":"2020-06-14T18:17:45"},{"date":"2020-06-22T13:13:53","version":"0.029"},{"version":"0.030","date":"2021-01-08T14:22:56"},{"version":"0.031","date":"2021-01-10T14:18:25"},{"date":"2021-03-18T21:02:33","version":"0.032"},{"date":"2021-05-01T17:18:31","version":"0.033"},{"version":"0.034","date":"2021-11-28T22:08:38"},{"date":"2023-10-03T10:20:23","version":"0.035"},{"date":"2025-01-26T10:17:48","version":"0.036"},{"date":"2025-04-27T15:02:48","version":"0.037"}],"main_module":"Crypt::JWT","advisories":[{"severity":"high","affected_versions":["<0.023"],"references":["https://github.com/DCIT/perl-Crypt-JWT/commit/b98a59b42ded9f9e51b2560410106207c2152d6c","https://www.openwall.com/lists/oss-security/2018/09/07/1"],"id":"CPANSA-Crypt-JWT-2019-01","description":"Perl Crypt::JWT prior to 0.023 is affected by: Incorrect Access Control. The impact is: allow attackers to bypass authentication by providing a token by crafting with hmac(). The component is: JWT.pm, line 614. The attack vector is: network connectivity. The fixed version is: after commit b98a59b42ded9f9e51b2560410106207c2152d6c.\n","distribution":"Crypt-JWT","reported":"2019-03-20","cves":["CVE-2019-1010263"],"fixed_versions":[">=0.023"]},{"cves":["CVE-2019-1010161"],"reported":"2019-03-20","fixed_versions":[">=0.022"],"distribution":"Crypt-JWT","description":"perl-CRYPT-JWT 0.022 and earlier is affected by: Incorrect Access Control. The impact is: bypass authentication. The component is: JWT.pm for JWT security token, line 614 in _decode_jws(). The attack vector is: network connectivity(crafting user-controlled input to bypass authentication). The fixed version is: 0.023.\n","id":"CPANSA-Crypt-JWT-2019-01","references":["https://github.com/DCIT/perl-Crypt-JWT/issues/3#issuecomment-417947483"],"affected_versions":["<0.022"],"severity":"high"}]},"App-cpanminus":{"versions":[{"date":"2010-02-20T02:27:00","version":"0.01"},{"version":"0.02","date":"2010-02-20T03:14:10"},{"date":"2010-02-20T03:39:56","version":"0.03"},{"version":"0.04","date":"2010-02-20T05:04:01"},{"date":"2010-02-20T05:16:03","version":"0.05"},{"date":"2010-02-20T05:48:44","version":"0.06"},{"version":"0.07","date":"2010-02-20T20:20:08"},{"version":"0.08","date":"2010-02-20T23:41:01"},{"date":"2010-02-21T07:48:49","version":"0.09"},{"date":"2010-02-23T20:52:46","version":"0.99_01"},{"date":"2010-02-24T06:20:33","version":"0.99_02"},{"date":"2010-02-24T07:05:47","version":"0.99_03"},{"version":"0.99_04","date":"2010-02-25T17:20:05"},{"version":"0.99_05","date":"2010-02-25T22:42:22"},{"date":"2010-02-25T22:51:43","version":"0.99_06"},{"version":"0.99_07","date":"2010-02-28T05:14:30"},{"date":"2010-03-01T05:59:15","version":"0.9910"},{"date":"2010-03-02T00:29:51","version":"0.9911"},{"version":"0.9912","date":"2010-03-03T02:55:22"},{"date":"2010-03-03T03:21:59","version":"0.9913"},{"date":"2010-03-04T08:42:03","version":"0.9914"},{"version":"0.9915","date":"2010-03-04T09:58:11"},{"date":"2010-03-04T19:35:22","version":"0.9916"},{"date":"2010-03-09T13:58:32","version":"0.9917"},{"version":"0.9918","date":"2010-03-10T02:26:03"},{"version":"0.9919","date":"2010-03-10T02:41:31"},{"version":"0.99_20","date":"2010-03-10T09:49:22"},{"version":"0.9921","date":"2010-03-10T15:03:38"},{"date":"2010-03-11T02:01:28","version":"0.9922"},{"version":"0.9923","date":"2010-03-16T00:07:01"},{"version":"0.99_24","date":"2010-03-22T05:05:33"},{"date":"2010-03-23T02:54:44","version":"0.99_25"},{"date":"2010-03-23T03:24:34","version":"0.99_26"},{"date":"2010-03-23T18:24:55","version":"0.9927"},{"version":"0.9928","date":"2010-03-26T05:09:12"},{"date":"2010-03-27T04:42:41","version":"0.9929"},{"date":"2010-03-30T21:29:41","version":"0.9930"},{"version":"0.9931","date":"2010-04-05T01:18:12"},{"date":"2010-04-05T23:28:11","version":"0.9932"},{"version":"0.99_33","date":"2010-04-11T07:51:27"},{"date":"2010-04-11T11:55:44","version":"0.9934"},{"version":"0.999_01","date":"2010-04-12T11:09:47"},{"date":"2010-04-13T07:11:08","version":"0.999_02"},{"date":"2010-04-14T09:29:25","version":"0.999_03"},{"date":"2010-04-14T09:30:52","version":"0.9935"},{"version":"0.999_04","date":"2010-04-19T06:23:01"},{"version":"0.999_05","date":"2010-04-21T11:40:46"},{"date":"2010-04-21T11:53:47","version":"0.9936"},{"date":"2010-04-24T08:23:24","version":"1.0000"},{"version":"1.0001","date":"2010-04-24T08:26:40"},{"version":"1.0002","date":"2010-05-02T03:51:09"},{"date":"2010-05-04T23:16:18","version":"1.0003"},{"date":"2010-05-14T23:10:54","version":"1.0004"},{"date":"2010-07-02T23:39:32","version":"1.0005"},{"date":"2010-07-02T23:54:14","version":"1.0006"},{"date":"2010-07-30T19:55:47","version":"1.0010"},{"version":"1.0011","date":"2010-08-18T23:42:36"},{"date":"2010-08-20T19:58:19","version":"1.0012"},{"date":"2010-09-12T19:54:17","version":"1.0013"},{"version":"1.0014","date":"2010-09-21T19:43:20"},{"version":"1.0015","date":"2010-09-24T23:52:00"},{"version":"1.1000","date":"2010-11-12T07:57:33"},{"version":"1.1001","date":"2010-11-12T20:37:49"},{"date":"2010-11-17T02:28:44","version":"1.1002"},{"date":"2010-11-25T09:18:34","version":"1.1003"},{"version":"1.1004","date":"2010-11-30T18:07:12"},{"date":"2010-12-14T23:08:40","version":"1.1005"},{"date":"2010-12-16T19:32:01","version":"1.1006"},{"date":"2011-01-18T17:40:16","version":"1.1007"},{"version":"1.19_01","date":"2011-01-18T20:54:34"},{"version":"1.19_02","date":"2011-01-18T22:11:52"},{"version":"1.1008","date":"2011-01-26T22:08:11"},{"date":"2011-02-16T18:11:52","version":"1.2000"},{"date":"2011-02-16T18:55:46","version":"1.2001"},{"date":"2011-03-01T02:59:25","version":"1.29_01"},{"version":"1.29_02","date":"2011-03-02T00:09:00"},{"date":"2011-03-02T22:41:40","version":"1.3000"},{"version":"1.3001","date":"2011-03-04T02:35:03"},{"version":"1.30_02","date":"2011-03-04T03:54:53"},{"version":"1.30_03","date":"2011-03-04T08:32:56"},{"version":"1.30_04","date":"2011-03-04T08:53:22"},{"date":"2011-03-04T09:41:34","version":"1.30_05"},{"version":"1.30_06","date":"2011-03-04T22:57:43"},{"date":"2011-03-04T23:20:45","version":"1.30_07"},{"version":"1.30_08","date":"2011-03-05T00:07:44"},{"version":"1.30_09","date":"2011-03-05T02:16:54"},{"date":"2011-03-05T22:57:38","version":"1.30_10"},{"version":"1.30_11","date":"2011-03-06T09:37:36"},{"version":"1.30_12","date":"2011-03-07T03:00:09"},{"date":"2011-03-07T18:54:03","version":"1.30_13"},{"date":"2011-03-08T09:11:33","version":"1.4000"},{"version":"1.4001","date":"2011-03-08T18:11:57"},{"date":"2011-03-09T01:57:18","version":"1.4002"},{"version":"1.4003","date":"2011-03-10T02:15:19"},{"version":"1.4004","date":"2011-03-10T18:09:34"},{"date":"2011-05-11T19:49:38","version":"1.4005"},{"version":"1.4006","date":"2011-05-16T17:17:29"},{"version":"1.4007","date":"2011-05-17T17:54:45"},{"date":"2011-06-16T01:00:00","version":"1.4008"},{"version":"1.49_01","date":"2011-06-26T17:59:17"},{"date":"2011-10-12T09:57:03","version":"1.49_02"},{"date":"2011-10-13T06:40:49","version":"1.5000"},{"version":"1.5001","date":"2011-10-13T15:21:16"},{"date":"2011-10-18T00:13:36","version":"1.5002"},{"date":"2011-10-19T07:31:10","version":"1.5003"},{"version":"1.5004","date":"2011-11-08T22:29:31"},{"version":"1.5005","date":"2011-11-22T21:31:21"},{"date":"2011-11-29T19:49:42","version":"1.5006"},{"version":"1.5007","date":"2011-12-20T18:18:50"},{"version":"1.5008","date":"2012-03-18T01:23:40"},{"version":"1.5009","date":"2012-03-30T16:45:43"},{"date":"2012-03-31T11:01:47","version":"1.5010"},{"date":"2012-04-12T09:59:39","version":"1.5011"},{"date":"2012-05-11T03:50:22","version":"1.5012"},{"date":"2012-05-12T03:18:19","version":"1.5013"},{"version":"1.5014","date":"2012-06-13T01:34:12"},{"version":"1.5015","date":"2012-06-24T22:37:49"},{"date":"2012-07-17T19:02:48","version":"1.5016"},{"version":"1.5017","date":"2012-07-18T15:41:26"},{"date":"2012-09-19T05:42:19","version":"1.5018"},{"date":"2012-12-22T17:22:02","version":"1.5019"},{"date":"2013-01-29T18:32:26","version":"1.5020"},{"date":"2013-01-31T08:45:31","version":"1.5021"},{"date":"2013-01-31T18:07:46","version":"1.59_01"},{"version":"1.59_02","date":"2013-02-01T03:12:10"},{"version":"1.59_03","date":"2013-02-01T18:54:58"},{"version":"1.59_04","date":"2013-02-03T17:07:16"},{"version":"1.59_05","date":"2013-02-04T19:52:48"},{"version":"1.59_06","date":"2013-02-05T20:40:30"},{"version":"1.59_07","date":"2013-02-06T19:17:51"},{"date":"2013-02-06T19:32:27","version":"1.59_08"},{"date":"2013-02-07T09:59:04","version":"1.59_09"},{"date":"2013-02-08T00:29:16","version":"1.59_10"},{"version":"1.59_11","date":"2013-02-11T22:12:12"},{"version":"1.59_12","date":"2013-02-14T02:15:12"},{"version":"1.59_13","date":"2013-02-25T20:16:34"},{"date":"2013-02-26T17:57:00","version":"1.6000"},{"version":"1.6001","date":"2013-02-27T01:04:54"},{"version":"1.6002","date":"2013-02-27T20:13:45"},{"date":"2013-03-08T19:03:47","version":"1.6003"},{"version":"1.6004","date":"2013-03-08T19:32:25"},{"version":"1.6005","date":"2013-03-08T19:48:06"},{"date":"2013-03-14T06:00:27","version":"1.6006"},{"version":"1.6007","date":"2013-03-17T21:34:17"},{"date":"2013-03-19T17:03:36","version":"1.6008"},{"version":"1.6100","date":"2013-03-25T04:10:51"},{"date":"2013-03-25T20:41:37","version":"1.6101"},{"date":"2013-03-28T00:16:09","version":"1.6102"},{"date":"2013-03-30T21:36:49","version":"1.6103"},{"version":"1.6104","date":"2013-04-03T01:04:42"},{"version":"1.6105","date":"2013-04-05T05:17:38"},{"version":"1.6106","date":"2013-04-06T21:19:18"},{"date":"2013-04-07T04:19:16","version":"1.6107"},{"date":"2013-04-13T06:32:52","version":"1.6108"},{"version":"1.6190","date":"2013-04-13T11:48:43"},{"version":"1.6191","date":"2013-04-14T03:09:40"},{"date":"2013-04-14T08:17:32","version":"1.6192"},{"version":"1.6193","date":"2013-04-15T07:37:08"},{"date":"2013-04-15T07:42:51","version":"1.6900"},{"version":"1.6901","date":"2013-04-21T00:50:44"},{"version":"1.6109","date":"2013-04-21T01:06:02"},{"date":"2013-04-21T01:18:10","version":"1.6902"},{"date":"2013-04-22T01:07:09","version":"1.6903"},{"version":"1.6904","date":"2013-04-24T02:24:37"},{"version":"1.6905","date":"2013-04-24T03:05:21"},{"date":"2013-04-25T06:20:23","version":"1.6906"},{"version":"1.6907","date":"2013-04-26T18:40:08"},{"date":"2013-04-27T01:12:17","version":"1.6908"},{"date":"2013-04-29T08:49:53","version":"1.6909"},{"date":"2013-05-03T07:29:32","version":"1.6910"},{"version":"1.6911","date":"2013-05-04T20:28:02"},{"version":"1.6912","date":"2013-05-06T20:59:52"},{"version":"1.6913","date":"2013-05-10T00:05:10"},{"date":"2013-05-12T23:03:52","version":"1.6914"},{"version":"1.6915","date":"2013-05-16T02:01:33"},{"version":"1.6916","date":"2013-06-04T10:55:37"},{"version":"1.6917","date":"2013-06-05T01:07:33"},{"date":"2013-06-10T20:03:21","version":"1.6918"},{"version":"1.6919","date":"2013-06-12T15:33:22"},{"date":"2013-06-14T21:09:54","version":"1.6920"},{"version":"1.6921","date":"2013-06-18T10:19:43"},{"date":"2013-06-19T20:57:09","version":"1.6922"},{"date":"2013-07-04T05:17:11","version":"1.6923"},{"version":"1.6924","date":"2013-07-16T18:38:21"},{"version":"1.6925","date":"2013-07-20T05:08:06"},{"version":"1.6926","date":"2013-07-20T16:03:14"},{"version":"1.6927","date":"2013-07-23T07:45:33"},{"version":"1.6928","date":"2013-07-23T21:07:02"},{"version":"1.6929","date":"2013-07-24T18:46:29"},{"version":"1.6930","date":"2013-07-24T20:48:14"},{"date":"2013-07-24T21:51:33","version":"1.6931"},{"date":"2013-07-24T22:29:04","version":"1.6932"},{"date":"2013-07-25T16:58:24","version":"1.6933"},{"version":"1.6934","date":"2013-07-26T23:17:21"},{"date":"2013-07-31T18:36:57","version":"1.6935"},{"version":"1.6936","date":"2013-08-05T04:37:54"},{"version":"1.6937","date":"2013-08-06T01:55:29"},{"version":"1.6938","date":"2013-08-06T06:12:45"},{"date":"2013-08-06T09:55:55","version":"1.6939"},{"version":"1.6940","date":"2013-08-08T19:36:34"},{"date":"2013-08-20T18:32:44","version":"1.6941"},{"date":"2013-08-27T18:11:47","version":"1.6942"},{"date":"2013-09-03T23:40:37","version":"1.6943"},{"version":"1.7000","date":"2013-09-04T22:02:21"},{"version":"1.7001","date":"2013-09-08T20:12:16"},{"version":"1.7100","date":"2013-09-19T05:31:34"},{"version":"1.7101","date":"2013-09-19T11:15:59"},{"date":"2013-09-20T04:33:50","version":"1.7102"},{"version":"1.7002","date":"2014-04-27T05:46:31"},{"version":"1.7003","date":"2014-04-27T15:11:46"},{"version":"1.7004","date":"2014-04-27T16:23:35"},{"version":"1.7005","date":"2014-09-02T04:00:49"},{"date":"2014-09-02T06:27:35","version":"1.7006"},{"date":"2014-09-05T12:04:41","version":"1.7005"},{"version":"1.7006","date":"2014-09-05T22:45:37"},{"version":"1.7007","date":"2014-09-09T16:26:54"},{"version":"1.7008","date":"2014-09-10T08:19:24"},{"date":"2014-09-10T08:44:00","version":"1.7009"},{"version":"1.7010","date":"2014-09-17T09:28:23"},{"version":"1.7011","date":"2014-09-22T06:08:51"},{"date":"2014-09-27T02:29:33","version":"1.7012"},{"version":"1.7013","date":"2014-10-07T06:52:45"},{"version":"1.7014","date":"2014-10-08T03:54:02"},{"version":"1.7015","date":"2014-11-14T21:14:40"},{"date":"2014-11-16T19:47:26","version":"1.7016"},{"version":"1.7017","date":"2014-11-25T22:01:56"},{"version":"1.7018","date":"2014-11-25T22:08:49"},{"date":"2014-12-04T20:52:24","version":"1.7019"},{"version":"1.7020","date":"2014-12-09T01:54:37"},{"version":"1.7021","date":"2014-12-12T05:43:01"},{"date":"2014-12-13T00:42:15","version":"1.7022"},{"version":"1.7023","date":"2015-01-04T23:00:30"},{"date":"2015-01-12T21:32:45","version":"1.7024"},{"version":"1.7025","date":"2015-02-07T06:59:17"},{"version":"1.7026","date":"2015-02-14T01:12:18"},{"date":"2015-02-14T20:15:20","version":"1.7027"},{"version":"1.7028","date":"2015-04-17T17:24:16"},{"date":"2015-04-18T22:16:17","version":"1.7029"},{"date":"2015-04-19T12:15:59","version":"1.7030"},{"date":"2015-04-22T21:14:17","version":"1.7031"},{"version":"1.7032","date":"2015-04-30T01:52:49"},{"version":"1.7033","date":"2015-05-02T00:18:54"},{"date":"2015-05-07T21:21:07","version":"1.7034"},{"version":"1.7035","date":"2015-06-05T17:51:53"},{"date":"2015-06-06T05:08:20","version":"1.7036"},{"date":"2015-06-18T21:38:47","version":"1.7037"},{"date":"2015-06-23T01:05:25","version":"1.7038"},{"date":"2015-06-29T01:06:18","version":"1.7039"},{"version":"1.7040","date":"2016-01-07T19:29:19"},{"version":"1.7041","date":"2016-05-08T18:29:30"},{"version":"1.7042","date":"2016-05-24T07:49:34"},{"version":"1.7043","date":"2017-04-03T03:57:15"},{"version":"1.7044","date":"2018-04-19T11:54:56"},{"date":"2018-04-20T12:17:48","version":"1.7900"},{"version":"1.7901","date":"2018-04-20T12:20:35"},{"date":"2018-04-20T12:43:24","version":"1.7902"},{"version":"1.7903","date":"2018-04-20T14:54:30"},{"date":"2018-04-20T21:22:56","version":"1.7904"},{"version":"1.7905","date":"2018-04-21T09:40:47"},{"version":"1.9015","date":"2018-04-21T10:57:20"},{"version":"1.9016","date":"2018-04-21T11:17:58"},{"date":"2018-04-21T17:31:13","version":"1.9017"},{"date":"2018-04-22T13:54:32","version":"1.9018"},{"version":"1.7906","date":"2018-04-25T09:27:31"},{"version":"1.7907","date":"2018-04-26T11:36:59"},{"version":"1.7045","date":"2022-01-27T03:05:02"},{"date":"2022-04-27T06:01:26","version":"1.7046"},{"date":"2023-07-30T06:01:02","version":"1.7047"},{"version":"1.7048","date":"2024-10-29T18:49:03"}],"main_module":"App::cpanminus","advisories":[{"affected_versions":["<=1.7044"],"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DENFY4CRTIZL5WYYUYUM4VKCJNXO4QIW/","https://metacpan.org/pod/App::cpanminus","https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/","https://access.redhat.com/security/cve/cve-2020-16154","https://security-tracker.debian.org/tracker/CVE-2020-16154","https://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html","https://github.com/miyagawa/cpanminus/pull/638"],"id":"CPANSA-App-cpanminus-2020-01","reported":"2020-07-30","fixed_versions":[">=1.7045"],"cves":["CVE-2020-16154"],"description":"The App::cpanminus package 1.7044 for Perl allows Signature Verification Bypass.\n","distribution":"App-cpanminus"},{"references":["https://github.com/miyagawa/cpanminus/issues/611","https://github.com/miyagawa/cpanminus/pull/674","https://security.metacpan.org/2024/08/26/cpanminus-downloads-code-using-insecure-http.html"],"affected_versions":["<=1.7047"],"id":"CPANSA-App-cpanminus-2024-45321","reported":"2024-08-27","cves":["CVE-2024-45321"],"fixed_versions":[],"description":"The App::cpanminus package through 1.7047 for Perl downloads code via insecure HTTP, enabling code execution for network attackers.\n","distribution":"App-cpanminus"}]},"Apache-ASP":{"versions":[{"date":"1998-06-24T02:10:51","version":"0.01"},{"date":"1998-07-11T01:48:14","version":"0.02"},{"date":"1998-09-14T11:13:32","version":"0.03"},{"version":"0.04","date":"1998-10-12T07:50:56"},{"version":"0.05","date":"1998-10-18T21:29:19"},{"date":"1999-02-06T06:04:50","version":"0.08"},{"version":"0.09","date":"1999-04-22T08:30:57"},{"version":"0.11","date":"1999-06-24T20:04:52"},{"date":"1999-07-02T07:05:05","version":"0.12"},{"version":"0.14","date":"1999-07-29T10:58:20"},{"version":"0.15","date":"1999-08-25T02:02:31"},{"version":"0.16","date":"1999-09-22T20:54:01"},{"date":"1999-11-16T04:44:48","version":"0.17"},{"version":"0.18","date":"2000-02-04T02:14:14"},{"version":"1.91","date":"2000-07-03T13:08:54"},{"version":"1.93","date":"2000-07-03T22:43:45"},{"version":"1.95","date":"2000-07-11T01:44:02"},{"version":"2.00","date":"2000-07-16T07:17:39"},{"date":"2000-07-22T23:31:36","version":"2.01"},{"date":"2000-08-02T00:11:15","version":"2.03"},{"version":"2.07","date":"2000-11-26T19:15:48"},{"version":"2.09","date":"2001-01-31T04:03:17"},{"version":"2.11","date":"2001-05-30T01:37:39"},{"date":"2001-06-12T00:41:33","version":"2.15"},{"version":"2.17","date":"2001-06-18T02:35:48"},{"date":"2001-07-11T05:27:22","version":"2.19"},{"date":"2001-08-05T23:01:50","version":"2.21"},{"date":"2001-10-11T07:54:39","version":"2.23"},{"version":"2.25","date":"2001-10-11T23:34:01"},{"version":"2.27","date":"2001-11-01T01:11:12"},{"version":"2.29","date":"2001-11-19T21:41:12"},{"date":"2002-01-22T09:52:49","version":"2.31"},{"date":"2002-04-30T09:12:20","version":"2.33"},{"date":"2002-05-30T19:47:22","version":"2.35"},{"version":"2.37","date":"2002-07-03T21:11:15"},{"version":"2.39","date":"2002-09-12T08:16:20"},{"date":"2002-09-30T06:35:47","version":"2.41"},{"version":"2.45","date":"2002-10-14T04:01:36"},{"version":"2.47","date":"2002-11-07T02:03:41"},{"version":"2.49","date":"2002-11-11T07:15:21"},{"date":"2003-02-10T21:11:34","version":"2.51"},{"date":"2003-04-10T16:27:14","version":"2.53"},{"date":"2003-08-10T07:39:57","version":"2.55"},{"version":"2.57","date":"2004-01-29T08:30:48"},{"version":"2.59","date":"2005-05-24T05:52:39"},{"date":"2008-05-25T23:07:57","version":"2.61"},{"version":"2.62","date":"2011-10-02T19:18:10"},{"version":"2.62","date":"2012-02-13T23:15:04"},{"version":2.63,"date":"2018-03-15T05:28:37"}],"main_module":"Apache::ASP","advisories":[{"severity":null,"references":["https://metacpan.org/release/CHAMAS/Apache-ASP-2.63/source/README"],"affected_versions":["<1.95"],"id":"CPANSA-Apache-ASP-2000-01","distribution":"Apache-ASP","description":"A bug would allow a malicious user possible writing of files in the same directory as the source.asp script.\n","fixed_versions":[">=1.95"],"reported":"2000-07-10","cves":[]}]},"Module-Load-Conditional":{"advisories":[{"id":"CPANSA-Module-Load-Conditional-2016-1238","cves":["CVE-2016-1238"],"reported":"2016-08-02","fixed_versions":[">=0.66"],"description":"(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","distribution":"Module-Load-Conditional","severity":"high","references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"affected_versions":["<0.66"]}],"versions":[{"version":"0.02","date":"2003-05-10T16:59:45"},{"date":"2003-05-31T12:30:25","version":"0.03"},{"date":"2003-10-05T15:11:11","version":"0.04"},{"version":"0.05","date":"2004-05-22T14:34:33"},{"date":"2004-12-03T15:53:27","version":"0.06"},{"date":"2005-01-13T18:59:45","version":"0.07"},{"version":"0.08","date":"2005-01-14T17:32:34"},{"date":"2006-08-01T20:05:30","version":"0.10"},{"date":"2006-08-13T13:08:40","version":"0.12"},{"date":"2007-01-03T17:38:46","version":"0.14"},{"date":"2007-01-25T21:40:29","version":"0.16"},{"version":"0.18","date":"2007-09-15T14:20:27"},{"date":"2007-10-03T15:27:25","version":"0.20"},{"date":"2007-10-15T08:19:21","version":"0.22"},{"version":"0.24","date":"2008-01-02T15:57:46"},{"date":"2008-02-29T16:01:59","version":"0.26"},{"version":"0.28","date":"2008-12-17T12:56:57"},{"date":"2009-01-19T15:56:22","version":"0.30"},{"version":"0.31_01","date":"2009-10-23T09:16:58"},{"version":"0.32","date":"2009-10-23T20:58:24"},{"version":"0.34","date":"2009-10-29T09:27:23"},{"version":"0.36","date":"2010-02-09T14:20:49"},{"version":"0.38","date":"2010-04-23T15:03:33"},{"version":"0.40","date":"2011-01-07T22:28:54"},{"date":"2011-02-09T15:29:28","version":"0.42"},{"date":"2011-02-09T21:54:40","version":"0.44"},{"date":"2011-09-07T23:02:16","version":"0.46"},{"date":"2012-03-15T13:58:36","version":"0.48"},{"date":"2012-04-27T21:29:11","version":"0.50"},{"version":"0.52","date":"2012-07-29T09:13:49"},{"date":"2012-08-12T08:13:47","version":"0.54"},{"date":"2013-08-29T20:32:38","version":"0.56"},{"date":"2013-09-01T10:25:33","version":"0.58"},{"version":"0.60","date":"2014-01-16T12:31:47"},{"date":"2014-01-24T15:55:28","version":"0.62"},{"version":"0.64","date":"2015-01-17T13:36:11"},{"date":"2016-07-27T07:37:34","version":"0.66"},{"date":"2016-07-29T07:05:40","version":"0.68"},{"date":"2019-11-10T14:37:30","version":"0.70"},{"version":"0.72","date":"2020-06-25T07:23:00"},{"date":"2020-08-21T08:09:10","version":"0.74"}],"main_module":"Module::Load::Conditional"},"Convert-ASN1":{"main_module":"Convert::ASN1","versions":[{"version":"0.04","date":"2000-04-03T21:52:45"},{"version":"0.05","date":"2000-05-12T10:14:51"},{"version":"0.06","date":"2000-05-22T11:08:54"},{"date":"2000-05-30T14:31:54","version":"0.07"},{"date":"2001-02-05T22:44:53","version":"0.08"},{"version":"0.09","date":"2001-04-19T23:07:25"},{"date":"2001-04-20T06:40:05","version":"0.10"},{"version":"0.11","date":"2001-06-11T13:37:41"},{"version":"0.12","date":"2001-07-31T17:11:59"},{"date":"2001-08-26T07:23:52","version":"0.13"},{"date":"2001-09-10T18:07:31","version":"0.14"},{"date":"2002-01-22T11:33:25","version":"0.15"},{"version":"0.16","date":"2002-08-20T00:05:24"},{"version":"0.17","date":"2003-05-12T17:52:00"},{"version":"0.18","date":"2003-10-08T14:31:56"},{"version":"0.19","date":"2005-04-19T00:51:07"},{"version":"0.20","date":"2006-02-22T01:29:15"},{"version":"0.21","date":"2007-02-03T02:50:32"},{"date":"2008-09-15T19:39:08","version":"0.22"},{"date":"2012-05-03T21:33:29","version":"0.23"},{"date":"2012-06-04T22:12:03","version":"0.24"},{"date":"2012-06-09T00:32:31","version":"0.25"},{"date":"2012-06-09T18:31:05","version":"0.26"},{"date":"2014-06-25T18:49:11","version":"0.27"},{"version":"0.28","date":"2021-05-23T21:05:04"},{"version":"0.29","date":"2021-05-24T21:29:37"},{"date":"2021-05-30T00:58:54","version":"0.30"},{"version":"0.31","date":"2021-06-03T01:30:40"},{"date":"2021-09-21T21:46:25","version":"0.32"},{"version":"0.33","date":"2021-09-22T22:51:23"},{"date":"2023-08-07T22:47:22","version":"0.34"}],"advisories":[{"affected_versions":["<0.27"],"references":["https://github.com/gbarr/perl-Convert-ASN1/issues/14","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONNQSW4SSKMG5RUEFZJZA5T5R2WXEGQF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6V3PJEQOT47ZO77263XPGS3Y3AJROI4X/"],"severity":"high","reported":"2020-04-07","fixed_versions":[],"cves":["CVE-2013-7488"],"description":"perl-Convert-ASN1 (aka the Convert::ASN1 module for Perl) through 0.27 allows remote attackers to cause an infinite loop via unexpected input.\n","distribution":"Convert-ASN1","id":"CPANSA-Convert-ASN1-2013-7488"}]},"XAO-Web":{"advisories":[{"severity":null,"references":["https://github.com/amaltsev/XAO-Web/commit/20dd1d3bc5b811503f5722a16037b60197fe7ef4","https://metacpan.org/release/AMALTSEV/XAO-Web-1.84/changes"],"affected_versions":["<1.84"],"id":"CPANSA-XAO-Web-2020-01","reported":"2020-09-18","cves":["CVE-2020-36827"],"fixed_versions":[">=1.84"],"description":"Embedded HTML in JSON data was not escaped.\n","distribution":"XAO-Web"}],"main_module":"XAO::Web","versions":[{"date":"2002-01-03T03:05:25","version":"1.0"},{"date":"2002-01-04T02:47:11","version":"1.01"},{"date":"2002-01-04T03:44:00","version":"1.02"},{"version":"1.03","date":"2002-03-19T04:56:54"},{"version":"1.04","date":"2002-11-09T02:33:07"},{"version":"1.05","date":"2003-11-13T02:15:48"},{"version":"1.05","date":"2003-11-13T07:09:31"},{"date":"2005-01-14T01:48:49","version":"1.06"},{"version":"1.07","date":"2005-02-01T03:24:39"},{"date":"2017-04-19T20:26:55","version":"1.45"},{"version":"1.46","date":"2017-04-20T00:32:26"},{"date":"2017-05-01T19:57:48","version":"1.47"},{"date":"2018-07-07T00:42:57","version":"1.68"},{"date":"2018-07-07T03:29:38","version":"1.69"},{"version":"1.70","date":"2018-07-07T16:38:26"},{"date":"2018-07-30T13:35:32","version":"1.71"},{"date":"2018-10-20T00:50:11","version":"1.72"},{"date":"2018-10-25T19:16:09","version":"1.73"},{"date":"2018-10-30T01:27:58","version":"1.74"},{"version":"1.75","date":"2019-01-10T02:17:29"},{"date":"2019-03-02T17:38:20","version":"1.76"},{"version":"1.77","date":"2019-04-26T23:13:56"},{"version":"1.78","date":"2019-11-20T20:52:59"},{"version":"1.79","date":"2019-12-24T02:26:57"},{"version":"1.80","date":"2020-01-10T01:19:32"},{"date":"2020-07-21T02:08:41","version":"1.81"},{"date":"2020-08-26T22:28:48","version":"1.82"},{"version":"1.83","date":"2020-08-26T23:19:26"},{"version":"1.84","date":"2020-09-18T03:22:46"},{"version":"1.85","date":"2020-09-22T23:47:44"},{"version":"1.86","date":"2020-09-23T00:51:16"},{"date":"2021-06-08T22:38:04","version":"1.87"},{"version":"1.88","date":"2022-04-09T02:06:50"},{"date":"2022-07-02T00:05:43","version":"1.89"},{"version":"1.90","date":"2022-12-08T04:50:55"},{"version":"1.91","date":"2023-05-22T21:52:57"},{"date":"2025-04-03T00:49:02","version":"1.92"},{"version":"1.93","date":"2025-04-03T02:01:24"}]},"Apache-MP3":{"advisories":[{"affected_versions":["<2.15"],"references":["https://metacpan.org/dist/Apache-MP3/changes"],"severity":null,"reported":"2001-01-01","fixed_versions":[">=2.15"],"cves":[],"distribution":"Apache-MP3","description":"A security bug allowed people to bypass the AllowDownload setting.\n","id":"CPANSA-Apache-MP3-2001-01"}],"main_module":"Apache::MP3","versions":[{"date":"2000-03-20T13:00:07","version":"1.00"},{"date":"2000-05-27T04:19:21","version":"2.00"},{"version":"2.01","date":"2000-05-27T04:34:42"},{"version":"2.02","date":"2000-05-28T16:17:59"},{"version":"2.04","date":"2000-08-23T13:46:23"},{"version":"2.05","date":"2000-08-25T14:45:54"},{"version":"2.06","date":"2000-08-26T03:41:07"},{"version":"2.08","date":"2000-08-31T20:28:28"},{"version":"2.10","date":"2000-09-03T18:31:17"},{"date":"2000-09-09T22:12:04","version":"2.11"},{"version":"2.12","date":"2000-11-21T22:15:07"},{"version":"2.14","date":"2000-12-31T04:29:03"},{"version":"2.15","date":"2001-01-02T03:37:33"},{"version":"2.16","date":"2001-05-01T02:43:47"},{"date":"2001-06-10T22:02:46","version":"2.18"},{"date":"2001-07-17T01:39:59","version":"2.19"},{"date":"2001-09-26T01:14:42","version":"2.20"},{"date":"2002-01-06T20:38:33","version":"2.22"},{"date":"2002-05-31T01:12:04","version":"2.26"},{"date":"2002-08-16T04:18:25","version":"3.00"},{"date":"2002-08-18T17:41:46","version":"3.01"},{"version":"3.03","date":"2002-10-14T03:26:03"},{"date":"2003-02-15T00:51:19","version":"3.04"},{"date":"2003-10-06T14:12:34","version":"3.05"},{"date":"2006-04-15T01:26:38","version":"4.00"}]},"Catalyst-Plugin-Static":{"versions":[{"version":"0.01","date":"2005-01-29T00:00:20"},{"date":"2005-02-19T20:28:50","version":"0.02"},{"version":"0.03","date":"2005-03-17T01:01:03"},{"version":"0.04","date":"2005-03-17T19:10:36"},{"version":"0.05","date":"2005-03-21T13:34:27"},{"version":"0.05","date":"2005-03-23T06:48:05"},{"date":"2005-04-15T16:58:18","version":"0.06"},{"date":"2005-04-17T14:50:45","version":"0.07"},{"version":"0.08","date":"2005-09-06T13:42:42"},{"date":"2005-11-14T08:38:35","version":"0.09"},{"date":"2005-11-14T10:26:31","version":"0.10"},{"date":"2009-10-18T18:13:00","version":"0.11"}],"main_module":"Catalyst::Plugin::Static","advisories":[{"id":"CPANSA-Catalyst-Plugin-Static-2005-01","description":"Serving files outside of $config->{root} directory.\n","distribution":"Catalyst-Plugin-Static","reported":"2005-11-14","fixed_versions":[">=0.10"],"cves":[],"affected_versions":["<0.10"]}]},"CryptX":{"versions":[{"date":"2013-04-11T15:10:25","version":"0.002"},{"version":"0.003","date":"2013-04-16T07:29:07"},{"date":"2013-04-16T07:37:29","version":"0.004"},{"version":"0.005","date":"2013-04-18T12:09:09"},{"version":"0.006","date":"2013-04-19T09:05:57"},{"date":"2013-04-23T10:03:54","version":"0.007"},{"version":"0.008","date":"2013-05-02T08:52:42"},{"version":"0.009","date":"2013-05-19T20:25:17"},{"version":"0.011","date":"2013-06-14T22:37:18"},{"date":"2013-06-17T20:00:17","version":"0.012"},{"version":"0.013","date":"2013-08-28T07:12:15"},{"date":"2013-09-11T14:31:01","version":"0.013_1"},{"version":"0.014","date":"2013-09-11T21:11:18"},{"date":"2013-09-12T08:21:21","version":"0.014_1"},{"date":"2013-09-12T09:12:21","version":"0.014_2"},{"version":"0.015","date":"2013-09-12T09:32:06"},{"version":"0.016","date":"2013-09-15T19:36:52"},{"version":"0.016_1","date":"2013-09-22T19:20:20"},{"version":"0.016_2","date":"2013-09-23T14:24:27"},{"version":"0.016_3","date":"2013-09-24T05:00:07"},{"version":"0.017","date":"2013-09-24T08:54:42"},{"version":"0.018","date":"2013-10-18T13:21:35"},{"date":"2013-10-20T21:13:35","version":"0.019"},{"version":"0.019_1","date":"2014-01-14T21:30:37"},{"version":"0.019_2","date":"2014-01-15T21:59:30"},{"version":"0.019_3","date":"2014-01-16T21:26:19"},{"version":"0.019_4","date":"2014-01-17T09:42:29"},{"version":"0.020","date":"2014-01-18T08:29:06"},{"date":"2014-01-23T15:47:50","version":"0.021"},{"date":"2015-04-17T01:18:47","version":"0.021_1"},{"version":"0.021_3","date":"2015-04-17T10:12:01"},{"date":"2015-05-06T07:55:21","version":"0.021_4"},{"date":"2015-05-11T21:56:39","version":"0.021_5"},{"version":"0.021_6","date":"2015-05-12T05:52:15"},{"version":"0.021_7","date":"2015-05-12T07:10:42"},{"date":"2015-05-14T09:27:41","version":"0.021_8"},{"date":"2015-05-15T11:08:26","version":"0.021_9"},{"version":"0.022","date":"2015-05-22T16:57:26"},{"date":"2015-06-10T20:37:54","version":"0.023"},{"date":"2015-06-26T06:13:25","version":"0.023_1"},{"version":"0.023_2","date":"2015-06-26T09:18:06"},{"date":"2015-06-29T20:09:16","version":"0.024"},{"version":"0.025","date":"2015-07-08T07:56:50"},{"version":"0.025_01","date":"2015-10-22T15:14:53"},{"date":"2015-11-28T18:58:17","version":"0.026"},{"version":"0.026_01","date":"2015-12-29T21:20:15"},{"date":"2015-12-29T21:20:27","version":"0.026_02"},{"version":"0.026_05","date":"2016-01-02T14:38:13"},{"version":"0.026_06","date":"2016-01-02T15:57:58"},{"date":"2016-01-03T14:36:53","version":"0.026_08"},{"date":"2016-01-10T09:47:31","version":"0.026_15"},{"version":"0.026_16","date":"2016-01-10T09:47:43"},{"version":"0.026_18","date":"2016-01-10T11:52:21"},{"version":"0.026_19","date":"2016-01-10T11:53:48"},{"date":"2016-01-10T17:03:45","version":"0.026_23"},{"version":"0.026_24","date":"2016-01-10T17:03:56"},{"version":"0.026_28","date":"2016-01-10T19:02:14"},{"date":"2016-01-10T20:49:06","version":"0.026_29"},{"date":"2016-01-12T22:25:58","version":"0.026_30"},{"version":"0.026_31","date":"2016-01-12T22:37:33"},{"version":"0.026_32","date":"2016-01-13T23:53:06"},{"version":"0.026_33","date":"2016-01-14T19:29:18"},{"date":"2016-01-14T19:30:45","version":"0.026_34"},{"version":"0.026_35","date":"2016-01-14T21:16:15"},{"version":"0.026_36","date":"2016-01-14T21:19:01"},{"date":"2016-01-22T23:01:16","version":"0.026_39"},{"date":"2016-01-24T22:12:32","version":"0.026_40"},{"date":"2016-01-24T22:36:42","version":"0.026_41"},{"date":"2016-01-25T20:44:46","version":"0.027"},{"date":"2016-01-25T21:42:58","version":"0.027_01"},{"version":"0.027_05","date":"2016-01-26T10:06:26"},{"date":"2016-03-15T09:51:01","version":"0.027_06"},{"date":"2016-03-23T19:44:54","version":"0.028"},{"date":"2016-03-28T14:31:13","version":"0.028_01"},{"version":"0.028_02","date":"2016-03-28T19:32:58"},{"date":"2016-03-31T12:07:46","version":"0.028_03"},{"version":"0.029","date":"2016-04-13T09:30:27"},{"date":"2016-04-13T09:46:59","version":"0.030"},{"date":"2016-05-01T16:53:05","version":"0.031"},{"version":"0.032","date":"2016-05-04T17:45:30"},{"date":"2016-05-09T20:20:49","version":"0.033"},{"version":"0.034","date":"2016-05-10T22:31:32"},{"version":"0.035","date":"2016-06-03T10:17:59"},{"date":"2016-06-07T19:22:05","version":"0.036"},{"date":"2016-06-16T17:04:27","version":"0.037"},{"date":"2016-07-06T18:27:46","version":"0.038"},{"version":"0.039","date":"2016-08-03T05:53:42"},{"date":"2016-09-12T08:42:39","version":"0.040"},{"date":"2016-10-12T09:32:48","version":"0.041"},{"version":"0.041_001","date":"2016-10-19T10:25:05"},{"version":"0.041_002","date":"2016-11-02T09:00:59"},{"version":"0.041_003","date":"2016-11-02T09:19:09"},{"version":"0.042","date":"2016-11-12T15:21:01"},{"version":"0.043","date":"2016-11-27T21:19:27"},{"version":"0.044","date":"2016-11-28T07:45:32"},{"version":"0.044_001","date":"2017-02-21T21:54:33"},{"version":"0.044_003","date":"2017-02-23T15:58:42"},{"date":"2017-02-23T20:35:46","version":"0.044_004"},{"version":"0.044_005","date":"2017-02-23T20:44:50"},{"date":"2017-02-28T12:22:27","version":"0.044_006"},{"date":"2017-02-28T13:58:51","version":"0.044_007"},{"version":"0.044_008","date":"2017-03-01T09:26:34"},{"version":"0.044_009","date":"2017-03-01T09:49:29"},{"version":"0.044_010","date":"2017-03-01T10:02:35"},{"date":"2017-03-31T09:28:10","version":"0.045"},{"date":"2017-04-04T09:08:33","version":"0.046"},{"date":"2017-04-05T20:09:35","version":"0.047"},{"version":"0.047_001","date":"2017-04-07T18:22:15"},{"date":"2017-04-07T21:40:24","version":"0.047_002"},{"date":"2017-04-10T08:16:03","version":"0.047_003"},{"version":"0.047_004","date":"2017-04-24T15:23:29"},{"version":"0.047_005","date":"2017-04-26T15:36:02"},{"version":"0.047_006","date":"2017-05-01T19:11:50"},{"version":"0.048","date":"2017-05-31T20:22:56"},{"version":"0.048_001","date":"2017-07-09T19:38:38"},{"date":"2017-07-14T17:43:25","version":"0.048_002"},{"date":"2017-07-18T05:56:42","version":"0.049"},{"date":"2017-07-18T20:37:45","version":"0.050"},{"version":"0.051","date":"2017-08-08T08:14:05"},{"date":"2017-09-15T12:32:56","version":"0.053"},{"version":"0.053_001","date":"2017-09-19T07:51:19"},{"date":"2017-09-19T18:46:56","version":"0.053_002"},{"date":"2017-09-20T09:56:04","version":"0.053_003"},{"version":"0.053_004","date":"2017-10-10T21:04:53"},{"date":"2017-10-12T07:27:42","version":"0.054"},{"date":"2017-10-23T13:18:12","version":"0.054_001"},{"version":"0.054_002","date":"2017-10-23T17:44:49"},{"version":"0.054_003","date":"2017-10-25T07:43:53"},{"date":"2017-10-30T17:53:14","version":"0.054_004"},{"date":"2017-10-31T18:27:22","version":"0.054_005"},{"version":"0.054_006","date":"2017-11-20T18:51:03"},{"date":"2017-11-24T08:15:31","version":"0.054_007"},{"version":"0.054_008","date":"2017-11-24T14:21:46"},{"version":"0.054_009","date":"2017-11-24T16:33:40"},{"date":"2017-11-28T10:19:52","version":"0.055"},{"date":"2017-12-18T19:05:35","version":"0.055_001"},{"version":"0.056","date":"2017-12-22T13:22:16"},{"version":"0.056_001","date":"2018-01-26T16:05:07"},{"date":"2018-01-29T06:18:08","version":"0.056_002"},{"date":"2018-01-29T10:02:58","version":"0.056_003"},{"date":"2018-01-29T23:05:27","version":"0.056_004"},{"version":"0.056_005","date":"2018-01-30T10:23:40"},{"version":"0.056_006","date":"2018-01-30T14:11:33"},{"date":"2018-01-30T16:08:38","version":"0.056_007"},{"date":"2018-01-30T16:29:41","version":"0.056_008"},{"version":"0.056_009","date":"2018-01-30T16:43:48"},{"date":"2018-01-31T08:56:12","version":"0.057"},{"version":"0.058","date":"2018-02-27T17:13:52"},{"date":"2018-03-08T09:30:22","version":"0.058_001"},{"date":"2018-03-18T16:27:43","version":"0.058_002"},{"date":"2018-03-25T15:45:36","version":"0.059"},{"version":"0.059_001","date":"2018-04-27T17:14:03"},{"version":"0.059_002","date":"2018-04-28T20:59:58"},{"version":"0.059_003","date":"2018-04-29T18:12:50"},{"version":"0.060","date":"2018-05-01T09:32:27"},{"version":"0.060_001","date":"2018-05-27T19:05:34"},{"date":"2018-05-28T07:18:37","version":"0.060_002"},{"date":"2018-06-06T15:49:28","version":"0.060_003"},{"date":"2018-06-07T05:25:50","version":"0.061"},{"date":"2018-10-24T20:35:24","version":"0.061_001"},{"version":"0.061_002","date":"2018-10-26T17:10:16"},{"date":"2018-10-29T10:46:25","version":"0.061_003"},{"version":"0.062","date":"2018-10-30T06:27:48"},{"date":"2018-11-22T10:43:01","version":"0.062_001"},{"date":"2018-11-28T10:48:28","version":"0.063"},{"date":"2019-06-06T09:36:14","version":"0.063_001"},{"version":"0.063_002","date":"2019-06-06T17:35:59"},{"date":"2019-06-10T17:24:53","version":"0.063_003"},{"date":"2019-06-12T13:33:28","version":"0.063_004"},{"date":"2019-06-12T23:12:09","version":"0.063_005"},{"version":"0.064","date":"2019-06-14T07:01:03"},{"date":"2019-10-19T18:49:19","version":"0.065"},{"version":"0.066","date":"2019-10-20T16:30:22"},{"date":"2020-01-26T20:23:46","version":"0.066_001"},{"date":"2020-01-30T10:21:29","version":"0.066_002"},{"date":"2020-02-01T13:24:27","version":"0.067"},{"date":"2020-03-08T19:21:55","version":"0.067_001"},{"version":"0.068","date":"2020-03-10T13:04:08"},{"date":"2020-08-02T08:51:06","version":"0.068_001"},{"date":"2020-08-25T07:12:43","version":"0.069"},{"version":"0.070","date":"2021-02-12T14:44:41"},{"version":"0.071","date":"2021-03-30T09:39:33"},{"version":"0.072","date":"2021-04-29T08:23:01"},{"date":"2021-07-12T16:40:01","version":"0.072_001"},{"date":"2021-07-13T07:03:12","version":"0.072_002"},{"date":"2021-07-13T20:54:22","version":"0.072_003"},{"version":"0.073","date":"2021-07-18T12:16:09"},{"version":"0.073_001","date":"2021-10-04T18:34:39"},{"date":"2021-10-10T18:41:04","version":"0.073_002"},{"version":"0.073_003","date":"2021-10-13T18:32:43"},{"version":"0.074","date":"2021-11-06T09:26:22"},{"date":"2021-12-25T09:39:17","version":"0.075"},{"version":"0.075_001","date":"2022-01-01T00:36:25"},{"date":"2022-01-01T13:19:24","version":"0.075_002"},{"date":"2022-01-01T19:48:49","version":"0.075_003"},{"version":"0.076","date":"2022-01-07T20:55:06"},{"date":"2022-06-09T18:18:34","version":"0.076_001"},{"date":"2022-08-20T15:42:12","version":"0.076_002"},{"date":"2022-08-20T18:14:10","version":"0.076_003"},{"date":"2022-08-21T07:46:06","version":"0.077"},{"version":"0.078","date":"2023-04-28T12:31:25"},{"date":"2023-07-25T18:36:58","version":"0.078_001"},{"date":"2023-10-01T12:20:32","version":"0.079"},{"version":"0.079_002","date":"2023-10-01T17:35:55"},{"version":"0.079_003","date":"2023-10-01T17:36:06"},{"date":"2023-10-02T07:47:50","version":"0.079_004"},{"date":"2023-10-02T11:22:48","version":"0.079_005"},{"date":"2023-10-02T15:06:17","version":"0.079_006"},{"date":"2023-10-03T10:16:25","version":"0.079_007"},{"date":"2023-10-04T11:07:16","version":"0.080"},{"date":"2023-10-07T11:45:30","version":"0.080_001"},{"date":"2024-08-17T10:06:21","version":"0.080_003"},{"version":"0.080_004","date":"2024-08-17T17:16:06"},{"version":"0.080_005","date":"2024-08-17T20:28:14"},{"version":"0.080_006","date":"2024-08-30T18:43:56"},{"version":"0.080_007","date":"2024-09-01T08:32:21"},{"date":"2024-09-01T09:26:40","version":"0.080_008"},{"version":"0.080_009","date":"2024-09-01T11:23:19"},{"date":"2024-09-02T14:51:29","version":"0.080_010"},{"version":"0.080_011","date":"2024-09-03T11:32:03"},{"date":"2024-09-03T18:01:58","version":"0.080_012"},{"version":"0.081","date":"2024-09-08T16:12:50"},{"date":"2024-10-03T11:12:24","version":"0.081_001"},{"version":"0.082","date":"2024-10-07T13:31:29"},{"version":"0.082_001","date":"2024-10-14T11:36:41"},{"version":"0.083","date":"2024-10-15T09:31:49"},{"date":"2024-10-15T15:09:00","version":"0.083_001"},{"version":"0.084","date":"2024-10-16T11:23:26"},{"version":"0.084_001","date":"2025-01-25T22:45:03"},{"date":"2025-02-08T10:02:22","version":"0.085"},{"version":"0.085_001","date":"2025-02-20T21:06:09"},{"date":"2025-04-27T15:46:56","version":"0.085_002"},{"date":"2025-04-27T17:37:48","version":"0.085_003"},{"version":"0.086","date":"2025-05-02T21:40:16"}],"main_module":"CryptX","advisories":[{"severity":null,"references":["https://github.com/DCIT/perl-CryptX/issues/47","https://github.com/libtom/libtomcrypt/pull/451"],"affected_versions":["<0.062"],"id":"CPANSA-CryptX-2018-01","description":"A user can pass anything as the tag into gcm_decrypt_verify() and it will return decrypted plaintext.\n","distribution":"CryptX","cves":["CVE-2018-25099"],"reported":"2018-10-26","fixed_versions":[">=0.062"]}]},"CGI-Session":{"advisories":[{"cves":["CVE-2006-1279"],"reported":"2006-03-19","fixed_versions":[],"distribution":"CGI-Session","description":"CGI::Session 4.03-1 allows local users to overwrite arbitrary files via a symlink attack on temporary files used by (1) Driver::File, (2) Driver::db_file, and possibly (3) Driver::sqlite.\n","id":"CPANSA-CGI-Session-2006-1279","references":["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=356555","http://secunia.com/advisories/19211","http://www.securityfocus.com/bid/17177","http://www.osvdb.org/23865","http://www.vupen.com/english/advisories/2006/0946","https://exchange.xforce.ibmcloud.com/vulnerabilities/25285"],"affected_versions":["<4.10"],"severity":null},{"severity":null,"affected_versions":["<4.12"],"references":["https://rt.cpan.org/Public/Bug/Display.html?id=18578"],"id":"CPANSA-CGI-Session-2006-01","description":"possible SQL injection attack\n","distribution":"CGI-Session","cves":[],"reported":"2006-04-06","fixed_versions":[">=4.12"]}],"versions":[{"date":"2001-10-30T08:59:10","version":"0.01"},{"version":"2.0","date":"2002-05-10T12:04:15"},{"date":"2002-05-10T17:38:46","version":"2.1"},{"version":"2.2","date":"2002-05-14T18:21:39"},{"version":"2.4","date":"2002-05-17T18:02:23"},{"version":"2.7","date":"2002-05-27T09:52:46"},{"date":"2002-06-06T08:08:21","version":"2.9"},{"version":"2.91","date":"2002-06-06T08:36:26"},{"version":"2.92","date":"2002-06-18T18:15:57"},{"date":"2002-08-26T08:23:54","version":"2.94"},{"date":"2002-11-27T07:20:47","version":"3.1"},{"version":"3.2","date":"2002-11-27T12:27:59"},{"date":"2002-11-28T03:19:31","version":"v3.2.2.1"},{"version":"3.3","date":"2002-11-28T03:26:41"},{"date":"2002-11-28T03:44:39","version":"3.4"},{"date":"2002-11-28T06:55:29","version":"3.5"},{"date":"2002-11-28T17:12:32","version":"3.6"},{"version":"3.7","date":"2002-11-29T21:29:53"},{"version":"3.8","date":"2002-12-03T16:26:55"},{"date":"2002-12-04T07:37:02","version":"3.9"},{"date":"2002-12-09T09:02:18","version":"3.10"},{"version":"3.11","date":"2002-12-09T20:09:24"},{"date":"2003-03-09T11:26:21","version":"3.91"},{"date":"2003-03-10T02:42:16","version":"3.92"},{"version":"3.93","date":"2003-03-14T13:21:20"},{"version":"3.94","date":"2003-05-02T20:12:40"},{"version":"3.95","date":"2003-07-26T13:51:31"},{"date":"2005-02-09T08:35:23","version":"4.00_01"},{"date":"2005-02-09T09:54:17","version":"4.00_02"},{"date":"2005-02-11T08:23:00","version":"4.00_03"},{"date":"2005-02-17T03:24:21","version":"4.00_04"},{"version":"4.00_05","date":"2005-02-22T17:56:43"},{"version":"4.00_06","date":"2005-02-24T18:46:45"},{"date":"2005-03-13T19:18:37","version":"4.00_07"},{"date":"2005-03-15T16:48:17","version":"4.00_08"},{"version":"4.00_09","date":"2005-07-22T02:00:21"},{"date":"2005-09-01T05:57:49","version":"4.00"},{"date":"2005-09-01T16:25:46","version":"4.01"},{"version":"4.02","date":"2005-09-02T15:51:20"},{"date":"2005-09-24T02:12:22","version":"4.02_01"},{"date":"2005-10-05T23:22:54","version":"4.03"},{"date":"2006-03-02T03:00:28","version":"4.04"},{"version":"4.05","date":"2006-03-04T00:08:26"},{"version":"4.06","date":"2006-03-09T03:13:06"},{"version":"4.07","date":"2006-03-09T12:09:28"},{"date":"2006-03-16T02:38:25","version":"4.08"},{"version":"4.09","date":"2006-03-17T04:08:57"},{"date":"2006-03-28T07:00:52","version":"4.10"},{"date":"2006-04-03T19:33:30","version":"4.11"},{"version":"4.12","date":"2006-04-07T14:34:06"},{"date":"2006-04-12T17:05:18","version":"4.13"},{"version":"4.14","date":"2006-06-11T11:36:57"},{"version":"4.20_1","date":"2006-11-24T14:10:38"},{"version":"4.20","date":"2006-12-05T02:08:37"},{"date":"2008-03-22T02:42:57","version":"4.29_1"},{"version":"4.29_2","date":"2008-03-28T01:45:56"},{"date":"2008-04-26T01:31:34","version":"4.30"},{"date":"2008-06-16T14:44:06","version":"4.31"},{"version":"4.32","date":"2008-06-17T21:35:03"},{"date":"2008-07-08T01:27:59","version":"4.33"},{"version":"4.34","date":"2008-07-13T02:39:59"},{"date":"2008-07-16T00:36:46","version":"4.35"},{"version":"4.36","date":"2008-09-13T15:45:06"},{"date":"2008-10-23T02:57:30","version":"4.37"},{"version":"4.38","date":"2008-11-01T03:47:46"},{"version":"4.39","date":"2008-12-16T01:22:42"},{"date":"2009-01-03T01:18:15","version":"4.40"},{"date":"2009-03-21T02:01:09","version":"4.41"},{"version":"4.42","date":"2009-08-26T13:38:39"},{"version":"4.43","date":"2010-12-12T00:32:27"},{"version":"4.44","date":"2011-06-06T20:48:07"},{"date":"2011-07-02T01:33:33","version":"4.45"},{"version":"4.46","date":"2011-07-08T14:34:42"},{"date":"2011-07-08T19:31:44","version":"4.47"},{"version":"4.48","date":"2011-07-11T13:02:37"},{"version":"4.49","date":"2021-02-08T07:00:20"}],"main_module":"CGI::Session"},"DBIx-Class-EncodedColumn":{"advisories":[{"severity":null,"affected_versions":["<0.11"],"references":["https://metacpan.org/release/WREIS/DBIx-Class-EncodedColumn-0.00032/changes","https://security.metacpan.org/docs/guides/random-data-for-security.html"],"id":"CPANSA-DBIx-Class-EncodedColumn-2025-27551","distribution":"DBIx-Class-EncodedColumn","description":"DBIx::Class::EncodedColumn use the rand() function, which is not cryptographically secure to salt password hashes. This vulnerability is associated with program files lib/DBIx/Class/EncodedColumn/Digest.pm. This issue affects DBIx::Class::EncodedColumn until 0.00032.","reported":"2025-03-26","cves":["CVE-2025-27551"],"fixed_versions":[">=0.11"]},{"severity":null,"references":["https://metacpan.org/release/WREIS/DBIx-Class-EncodedColumn-0.00032/changes","https://security.metacpan.org/docs/guides/random-data-for-security.html"],"affected_versions":["<0.11"],"id":"CPANSA-DBIx-Class-EncodedColumn-2025-27552","reported":"2025-03-26","fixed_versions":[">=0.11"],"cves":["CVE-2025-27552"],"description":"DBIx::Class::EncodedColumn use the rand() function, which is not cryptographically secure to salt password hashes. This vulnerability is associated with program files Crypt/Eksblowfish/Bcrypt.pm. This issue affects DBIx::Class::EncodedColumn until 0.00032.","distribution":"DBIx-Class-EncodedColumn"}],"main_module":"DBIx::Class::EncodedColumn","versions":[{"version":"0.00001_01","date":"2008-01-29T23:47:22"},{"date":"2008-01-31T23:21:56","version":"0.00001_02"},{"date":"2008-02-01T00:17:42","version":"0.00001_03"},{"version":"0.00001","date":"2008-02-01T18:52:21"},{"version":"0.00002","date":"2008-07-28T22:45:39"},{"version":"0.00003","date":"2009-09-01T15:45:04"},{"version":"0.00004","date":"2009-09-03T18:11:37"},{"date":"2009-10-11T15:06:19","version":"0.00005"},{"version":"0.00006","date":"2010-01-16T00:39:59"},{"date":"2010-04-30T00:12:56","version":"0.00007"},{"version":"0.00008","date":"2010-04-30T17:51:03"},{"date":"2010-05-17T20:20:11","version":"0.00009_1"},{"date":"2010-05-18T14:56:30","version":"0.00009"},{"date":"2010-08-27T18:36:04","version":"0.00010"},{"date":"2011-04-11T20:21:16","version":"0.00011"},{"version":"0.00012","date":"2013-04-29T14:32:51"},{"date":"2014-02-27T13:50:24","version":"0.00013"},{"date":"2016-05-31T13:31:04","version":"0.00014"},{"date":"2016-06-01T14:04:39","version":"0.00015"},{"date":"2019-06-12T12:59:07","version":"0.00016"},{"version":"0.00017","date":"2019-09-03T21:54:20"},{"date":"2019-09-16T18:10:46","version":"0.00018"},{"date":"2019-09-19T18:13:13","version":"0.00019"},{"version":"0.00020","date":"2019-09-25T12:34:33"},{"date":"2025-03-25T14:30:45","version":"0.00030"},{"version":"0.00031","date":"2025-03-25T17:55:22"},{"version":"0.00032","date":"2025-03-25T18:05:54"},{"date":"2025-03-26T11:34:06","version":"0.1.0"},{"version":"0.11","date":"2025-03-26T11:40:46"}]},"ActivePerl":{"advisories":[{"id":"CPANSA-ActivePerl-2012-5377","darkpan":"true","distribution":"ActivePerl","description":"Untrusted search path vulnerability in the installation functionality in ActivePerl 5.16.1.1601, when installed in the top-level C:\\ directory, allows local users to gain privileges via a Trojan horse DLL in the C:\\Perl\\Site\\bin directory, which is added to the PATH system environment variable, as demonstrated by a Trojan horse wlbsctrl.dll file used by the \"IKE and AuthIP IPsec Keying Modules\" system service in Windows Vista SP1, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 Release Preview.\n","fixed_versions":[],"reported":"2012-10-11","cves":["CVE-2012-5377"],"severity":null,"references":["https://www.htbridge.com/advisory/HTB23108","http://osvdb.org/86177"],"affected_versions":["=5.16.1.1601"]},{"references":["http://secunia.com/advisories/20328","http://www.securityfocus.com/bid/18269","http://www.osvdb.org/25974","http://www.vupen.com/english/advisories/2006/2140","https://exchange.xforce.ibmcloud.com/vulnerabilities/26915"],"affected_versions":["=5.8.8.817"],"severity":null,"reported":"2006-06-06","cves":["CVE-2006-2856"],"fixed_versions":[],"distribution":"ActivePerl","description":"ActiveState ActivePerl 5.8.8.817 for Windows configures the site/lib directory with \"Users\" group permissions for changing files, which allows local users to gain privileges by creating a malicious sitecustomize.pl file in that directory. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.\n","darkpan":"true","id":"CPANSA-ActivePerl-2006-2856"},{"severity":null,"references":["http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0878.html","http://www.securityfocus.com/bid/10380","https://exchange.xforce.ibmcloud.com/vulnerabilities/16224"],"affected_versions":["<=5.8.1"],"darkpan":"true","id":"CPANSA-ActivePerl-2004-2286","cves":["CVE-2004-2286"],"reported":"2004-12-31","fixed_versions":[],"description":"Integer overflow in the duplication operator in ActivePerl allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large multiplier, which may trigger a buffer overflow.\n","distribution":"ActivePerl"},{"id":"CPANSA-ActivePerl-2004-2022","darkpan":"true","description":"ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl.\n","distribution":"ActivePerl","reported":"2004-12-31","cves":["CVE-2004-2022"],"fixed_versions":[],"severity":null,"affected_versions":["<5.10"],"references":["http://www.oliverkarow.de/research/ActivePerlSystemBOF.txt","http://www.perlmonks.org/index.pl?node_id=354145","http://www.securityfocus.com/bid/10375","http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0905.html","http://marc.info/?l=full-disclosure&m=108489112131099&w=2","http://marc.info/?l=full-disclosure&m=108482796105922&w=2","http://marc.info/?l=full-disclosure&m=108483058514596&w=2","http://marc.info/?l=bugtraq&m=108489894009025&w=2","https://exchange.xforce.ibmcloud.com/vulnerabilities/16169"]},{"references":["http://www.kb.cert.org/vuls/id/722414","http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019794.html","http://public.activestate.com/cgi-bin/perlbrowse?patch=22552","http://www.idefense.com/application/poi/display?id=93&type=vulnerabilities","http://marc.info/?l=bugtraq&m=108118694327979&w=2","https://exchange.xforce.ibmcloud.com/vulnerabilities/15732"],"affected_versions":[],"severity":null,"distribution":"ActivePerl","description":"Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.\n","reported":"2004-05-04","cves":["CVE-2004-0377"],"fixed_versions":[],"id":"CPANSA-ActivePerl-2004-0377","darkpan":"true"},{"severity":null,"references":["http://bugs.activestate.com/show_bug.cgi?id=18062","http://www.securityfocus.com/bid/3526","http://www.osvdb.org/678","http://marc.info/?l=bugtraq&m=100583978302585&w=2","https://exchange.xforce.ibmcloud.com/vulnerabilities/7539"],"affected_versions":["<=5.6.1.629"],"darkpan":"true","id":"CPANSA-ActivePerl-2001-0815","fixed_versions":[],"reported":"2001-12-06","cves":["CVE-2001-0815"],"distribution":"ActivePerl","description":"Buffer overflow in PerlIS.dll in Activestate ActivePerl 5.6.1.629 and earlier allows remote attackers to execute arbitrary code via an HTTP request for a long filename that ends in a .pl extension.\n"}],"main_module":"","versions":[]},"HTML-Parser":{"main_module":"HTML::Parser","versions":[{"date":"1998-03-31T22:25:05","version":"2.14"},{"version":"2.16","date":"1998-04-02T11:40:38"},{"version":"2.17","date":"1998-04-28T08:35:12"},{"version":"2.18","date":"1998-06-22T19:45:24"},{"date":"1998-07-06T23:12:33","version":"2.19"},{"date":"1998-07-08T13:05:04","version":"2.20"},{"version":"2.21","date":"1998-11-13T21:48:08"},{"date":"1999-06-09T10:34:35","version":"2.23"},{"version":"2.24","date":"1999-11-03T07:10:32"},{"version":"2.25","date":"1999-11-05T09:46:11"},{"version":"3.00","date":"1999-12-14T23:01:49"},{"version":"3.01","date":"1999-12-19T07:07:38"},{"date":"1999-12-21T09:55:56","version":"3.02"},{"version":"3.04","date":"2000-01-15T16:25:39"},{"version":"3.05","date":"2000-01-22T16:14:25"},{"version":"3.06","date":"2000-03-06T14:00:15"},{"version":"3.07","date":"2000-03-20T12:47:48"},{"version":"3.08","date":"2000-05-23T10:59:19"},{"date":"2000-06-28T08:49:09","version":"3.09"},{"date":"2000-06-29T07:52:47","version":"3.10"},{"date":"2000-08-22T10:04:28","version":"3.11"},{"date":"2000-09-14T18:22:47","version":"3.12"},{"date":"2000-09-17T01:55:45","version":"3.13"},{"version":"3.14","date":"2000-12-04T06:05:39"},{"version":"3.15","date":"2000-12-26T09:04:53"},{"date":"2001-02-23T07:21:20","version":"3.16"},{"version":"3.17","date":"2001-02-24T06:32:38"},{"date":"2001-02-25T04:51:50","version":"3.18"},{"version":"3.19","date":"2001-03-10T04:32:27"},{"version":"3.19_90","date":"2001-03-13T19:44:52"},{"date":"2001-03-16T02:29:32","version":"3.19"},{"date":"2001-03-19T19:26:50","version":"3.19_91"},{"version":"3.19_92","date":"2001-03-26T15:37:39"},{"date":"2001-03-27T19:44:20","version":"3.19_93"},{"version":"3.19_94","date":"2001-03-30T08:24:11"},{"date":"2001-04-03T00:18:14","version":"3.20"},{"version":"3.21","date":"2001-04-10T22:34:03"},{"date":"2001-04-18T05:31:23","version":"3.22"},{"date":"2001-05-02T04:18:51","version":"3.23"},{"date":"2001-05-05T06:18:21","version":"3.23"},{"date":"2001-05-09T07:23:34","version":"3.24"},{"version":"3.25","date":"2001-05-11T17:26:39"},{"date":"2001-06-12T08:35:06","version":"3.25"},{"version":"3.26","date":"2002-03-17T20:11:55"},{"date":"2003-01-18T13:08:01","version":"3.27"},{"date":"2003-04-17T03:56:32","version":"3.28"},{"version":"3.29","date":"2003-08-15T06:11:17"},{"date":"2003-08-18T05:48:21","version":"3.30"},{"date":"2003-08-19T14:56:07","version":"3.31"},{"version":"3.32","date":"2003-10-10T14:31:48"},{"date":"2003-10-14T10:53:29","version":"3.33"},{"version":"3.34","date":"2003-10-27T21:23:09"},{"version":"3.35","date":"2003-12-12T14:27:23"},{"date":"2004-04-01T12:21:44","version":"3.36"},{"date":"2004-11-10T18:56:54","version":"3.37"},{"date":"2004-11-11T10:19:56","version":"3.38"},{"version":"3.39_90","date":"2004-11-17T14:33:49"},{"date":"2004-11-23T11:46:30","version":"3.39_91"},{"date":"2004-11-23T22:25:21","version":"3.39_92"},{"date":"2004-11-29T11:14:34","version":"3.40"},{"date":"2004-11-30T09:30:56","version":"3.41"},{"date":"2004-12-04T11:54:54","version":"3.42"},{"version":"3.43","date":"2004-12-06T09:19:28"},{"date":"2004-12-28T14:07:28","version":"3.44"},{"date":"2005-01-06T09:09:45","version":"3.45"},{"version":"3.46","date":"2005-10-24T12:34:04"},{"version":"3.47","date":"2005-11-22T21:50:09"},{"date":"2005-12-02T17:41:00","version":"3.48"},{"date":"2006-02-08T10:58:39","version":"3.49"},{"date":"2006-02-14T18:32:51","version":"3.50"},{"version":"3.51","date":"2006-03-22T09:26:15"},{"date":"2006-04-26T08:43:13","version":"3.52"},{"date":"2006-04-27T11:55:34","version":"3.53"},{"date":"2006-04-28T08:21:04","version":"3.54"},{"version":"3.55","date":"2006-07-10T09:16:22"},{"version":"3.56","date":"2007-01-12T11:00:07"},{"date":"2008-11-16T21:45:07","version":"3.57"},{"date":"2008-11-17T11:35:37","version":"3.58"},{"version":"3.59","date":"2008-11-24T09:15:09"},{"version":"3.60","date":"2009-02-09T11:26:08"},{"version":"3.61","date":"2009-06-20T09:34:17"},{"version":"3.62","date":"2009-08-13T21:01:27"},{"version":"3.63","date":"2009-10-22T20:11:52"},{"version":"3.64","date":"2009-10-25T12:24:11"},{"date":"2010-04-04T20:44:00","version":"3.65"},{"date":"2010-07-09T13:27:13","version":"3.66"},{"version":"3.67","date":"2010-08-17T17:15:19"},{"version":"3.68","date":"2010-09-01T21:28:52"},{"version":"3.69","date":"2011-10-15T15:35:01"},{"version":"3.70","date":"2013-03-28T22:21:30"},{"version":"3.71","date":"2013-05-08T22:23:29"},{"version":"3.72","date":"2016-01-19T17:44:02"},{"date":"2020-08-25T17:40:17","version":"3.73"},{"date":"2020-08-30T18:40:48","version":"3.74"},{"version":"3.75","date":"2020-08-30T19:58:22"},{"version":"3.76","date":"2021-03-04T18:06:59"},{"version":"3.77","date":"2022-03-14T22:12:49"},{"date":"2022-03-28T15:23:23","version":"3.78"},{"version":"3.79","date":"2022-10-12T15:41:58"},{"date":"2022-11-01T14:19:26","version":"3.80"},{"date":"2023-01-31T03:13:18","version":"3.81"},{"date":"2024-03-13T20:11:51","version":"3.82"},{"date":"2024-07-30T16:42:50","version":"3.83"}],"advisories":[{"reported":"2009-10-29","cves":["CVE-2009-3627"],"fixed_versions":[">=3.63"],"distribution":"HTML-Parser","description":"The decode_entities function in util.c in HTML-Parser before 3.63 allows context-dependent attackers to cause a denial of service (infinite loop) via an incomplete SGML numeric character reference, which triggers generation of an invalid UTF-8 character.\n","id":"CPANSA-HTML-Parser-2009-3627","affected_versions":["<3.63"],"references":["https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6225","http://www.openwall.com/lists/oss-security/2009/10/23/9","http://secunia.com/advisories/37155","http://www.securityfocus.com/bid/36807","https://bugzilla.redhat.com/show_bug.cgi?id=530604","http://www.vupen.com/english/advisories/2009/3022","http://github.com/gisle/html-parser/commit/b9aae1e43eb2c8e989510187cff0ba3e996f9a4c","https://exchange.xforce.ibmcloud.com/vulnerabilities/53941"],"severity":null}]},"PGObject-Util-DBAdmin":{"versions":[{"version":"0.01","date":"2014-09-11T11:20:13"},{"date":"2014-09-12T02:45:35","version":"0.02"},{"version":"0.03","date":"2014-09-13T02:03:16"},{"version":"0.04","date":"2014-09-13T14:37:42"},{"version":"0.05","date":"2014-09-14T07:48:28"},{"version":"0.06","date":"2014-09-17T08:27:06"},{"date":"2015-07-16T14:55:28","version":"0.07"},{"date":"2016-02-11T18:01:16","version":"0.08"},{"date":"2016-07-18T11:03:07","version":"0.09"},{"version":"v0.09.0","date":"2016-12-16T21:20:09"},{"version":"v0.10.0","date":"2016-12-16T21:36:46"},{"date":"2016-12-16T21:43:21","version":"v0.100.0"},{"date":"2018-03-31T14:06:25","version":"v0.120.0"},{"version":"v0.130.0","date":"2018-05-06T09:28:39"},{"date":"2018-06-05T19:29:29","version":"v0.130.1"},{"version":"v0.131.0","date":"2019-07-07T08:06:48"},{"version":"v1.0.0","date":"2019-07-08T20:46:34"},{"version":"v1.0.1","date":"2019-07-09T18:04:14"},{"date":"2019-09-20T06:49:02","version":"v1.0.2"},{"version":"v1.0.3","date":"2019-09-29T18:24:55"},{"date":"2020-09-21T21:20:33","version":"v1.1.0"},{"date":"2020-10-21T20:17:28","version":"v1.2.0"},{"version":"v1.2.1","date":"2020-10-21T22:24:41"},{"version":"v1.2.2","date":"2020-10-23T18:46:24"},{"date":"2020-10-24T07:08:10","version":"v1.2.3"},{"date":"2020-10-24T19:58:09","version":"v1.3.0"},{"date":"2020-10-25T12:15:26","version":"v1.4.0"},{"date":"2021-09-24T12:47:40","version":"v1.5.0"},{"version":"v1.6.0","date":"2021-11-07T12:22:17"},{"version":"v1.6.1","date":"2021-11-07T14:17:22"},{"version":"v1.6.2","date":"2024-09-13T19:24:01"}],"main_module":"PGObject::Util::DBAdmin","advisories":[{"references":["https://archive.ledgersmb.org/ledger-smb-announce/msg00280.html"],"affected_versions":["<1.6.0"],"fixed_versions":[">=1.6.0"],"reported":"2018-06-18","cves":["CVE-2018-9246"],"distribution":"PGObject-Util-DBAdmin","description":"The PGObject::Util::DBAdmin module before 0.120.0 for Perl, as used in LedgerSMB through 1.5.x, insufficiently sanitizes or escapes variable values used as part of shell command execution, resulting in shell code injection via the create(), run_file(), backup(), or restore() function. The vulnerability allows unauthorized users to execute code with the same privileges as the running application.\n","id":"CPANSA-PGObject-Util-DBAdmin-2018-01"}]},"App-japerl":{"main_module":"App::japerl","versions":[{"date":"2018-09-07T15:19:24","version":"0.10"},{"version":"0.11","date":"2018-09-08T15:07:20"},{"date":"2019-07-14T03:35:18","version":"0.12"},{"date":"2021-02-18T14:03:58","version":"0.13"},{"version":"0.14","date":"2021-09-18T18:20:37"},{"version":"0.15","date":"2023-03-25T01:04:11"}],"advisories":[{"severity":"high","affected_versions":["<0.09"],"references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"id":"CPANSA-App-japerl-2016-1238","description":"(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","distribution":"App-japerl","reported":"2016-08-02","fixed_versions":[">=0.09"],"cves":["CVE-2016-1238"]}]},"App-Github-Email":{"advisories":[{"id":"CPANSA-App-Github-Email-2018-01","description":"Insecure dependency on Email::Address.\n","distribution":"App-Github-Email","reported":"2018-01-20","cves":["CVE-2015-7686"],"fixed_versions":[">=0.3.3"],"references":["https://metacpan.org/changes/distribution/App-Github-Email","https://github.com/faraco/App-Github-Email/commit/b7f052280d1c8ae97bdefc106ca3cbba4aea7213"],"affected_versions":["<0.3.3"]}],"main_module":"App::Github::Email","versions":[{"version":"0.0.1","date":"2017-01-16T08:03:02"},{"date":"2017-01-16T12:56:51","version":"0.0.2"},{"date":"2017-01-16T17:38:16","version":"0.0.3"},{"version":"0.0.4","date":"2017-03-11T10:45:23"},{"date":"2017-04-05T11:19:02","version":"0.0.5"},{"date":"2017-04-15T17:35:18","version":"0.0.6"},{"version":"0.0.7","date":"2017-05-19T05:05:24"},{"date":"2017-12-18T14:11:19","version":"0.1.0"},{"date":"2017-12-21T08:24:12","version":"0.1.1"},{"version":"0.2.0","date":"2018-01-15T03:18:05"},{"date":"2018-01-20T12:55:34","version":"0.2.1"},{"date":"2018-08-30T16:07:18","version":"0.3.1"},{"date":"2018-08-30T16:13:54","version":"0.3.2"},{"version":"0.3.3","date":"2018-08-31T03:49:31"}]},"CGI-apacheSSI":{"advisories":[{"id":"CPANSA-CGI-apacheSSI-2016-01","description":"Security and parsing problems with \"include\" calls.\n","distribution":"CGI-apacheSSI","reported":"2016-01-31","cves":[],"fixed_versions":[">=0.95"],"affected_versions":["<0.95"],"references":["https://metacpan.org/changes/distribution/CGI-apacheSSI"]}],"main_module":"CGI::apacheSSI","versions":[{"date":"2014-08-20T22:55:20","version":"0.93"},{"date":"2016-01-30T12:57:47","version":"0.94"},{"version":"0.95","date":"2016-01-31T22:48:55"},{"version":"0.96","date":"2016-02-01T00:36:49"}]},"DBD-SQLite":{"versions":[{"version":"0.05","date":"2002-02-19T18:56:55"},{"date":"2002-02-22T07:29:26","version":"0.06"},{"date":"2002-02-23T11:19:51","version":"0.07"},{"version":"0.08","date":"2002-02-25T12:59:46"},{"date":"2002-02-27T19:46:01","version":"0.09"},{"version":"0.10","date":"2002-02-28T11:11:10"},{"version":"0.11","date":"2002-03-13T12:16:23"},{"version":"0.12","date":"2002-03-21T16:49:25"},{"date":"2002-03-26T22:39:39","version":"0.13"},{"version":"0.14","date":"2002-03-28T15:59:02"},{"date":"2002-04-02T10:48:10","version":"0.15"},{"date":"2002-06-17T23:50:53","version":"0.16"},{"version":"0.17","date":"2002-06-26T13:59:05"},{"date":"2002-07-12T13:46:37","version":"0.18"},{"date":"2002-08-13T22:19:45","version":"0.19"},{"version":"0.20","date":"2002-10-17T16:25:57"},{"date":"2002-10-18T07:08:42","version":"0.21"},{"version":"0.22","date":"2002-12-18T18:02:11"},{"date":"2002-12-29T16:25:29","version":"0.23"},{"version":"0.24","date":"2003-01-29T16:47:23"},{"date":"2003-03-06T22:24:48","version":"0.25"},{"version":"0.26","date":"2003-07-31T15:16:06"},{"date":"2003-08-18T20:17:31","version":"0.27"},{"version":"0.28","date":"2003-08-25T13:42:07"},{"version":"0.29","date":"2003-12-05T15:42:05"},{"date":"2004-02-08T18:45:02","version":"0.30"},{"date":"2004-02-14T19:18:16","version":"0.31"},{"date":"2004-07-21T21:19:33","version":"1.00"},{"version":"1.01","date":"2004-08-01T04:49:09"},{"date":"2004-08-02T18:35:42","version":"1.02"},{"version":"1.03","date":"2004-08-09T15:43:59"},{"date":"2004-08-23T15:14:21","version":"1.04"},{"date":"2004-09-10T15:46:34","version":"1.05"},{"date":"2004-09-21T17:26:28","version":"1.06"},{"version":"1.07","date":"2004-10-12T09:07:33"},{"version":"1.08","date":"2005-02-26T13:47:33"},{"version":"1.09","date":"2005-06-20T15:42:32"},{"date":"2005-12-01T20:56:30","version":"1.10"},{"version":"1.11","date":"2005-12-02T19:13:29"},{"date":"2006-04-10T02:24:08","version":"1.12"},{"version":"1.13","date":"2006-09-08T05:02:06"},{"version":"1.14","date":"2007-09-19T19:25:09"},{"date":"2009-03-27T11:11:41","version":"1.19_01"},{"date":"2009-03-28T16:46:41","version":"1.19_02"},{"date":"2009-03-30T21:58:59","version":"1.19_03"},{"version":"1.19_04","date":"2009-03-31T20:31:37"},{"date":"2009-04-02T04:24:12","version":"1.19_05"},{"version":"1.19_06","date":"2009-04-03T19:21:54"},{"date":"2009-04-04T00:49:42","version":"1.19_07"},{"date":"2009-04-04T04:29:03","version":"1.19_08"},{"version":"1.19_09","date":"2009-04-05T03:16:37"},{"version":"1.19_10","date":"2009-04-05T19:43:04"},{"date":"2009-04-07T14:00:36","version":"1.20"},{"date":"2009-04-08T01:24:11","version":"1.21"},{"version":"1.22_01","date":"2009-04-08T02:05:13"},{"version":"1.22_02","date":"2009-04-08T11:49:36"},{"date":"2009-04-09T09:40:39","version":"1.22_03"},{"date":"2009-04-11T01:58:53","version":"1.22_04"},{"date":"2009-04-14T15:52:05","version":"1.22_05"},{"date":"2009-04-15T14:59:20","version":"1.22_06"},{"version":"1.22_07","date":"2009-04-16T05:40:28"},{"date":"2009-04-17T09:08:15","version":"1.22_08"},{"version":"1.23","date":"2009-04-19T09:53:00"},{"version":"1.24_01","date":"2009-04-22T02:14:33"},{"version":"1.24_02","date":"2009-04-23T00:50:02"},{"date":"2009-04-23T10:20:49","version":"1.25"},{"version":"1.26_01","date":"2009-05-05T06:04:00"},{"version":"1.26_02","date":"2009-06-19T06:56:29"},{"date":"2009-08-12T06:01:13","version":"1.26_03"},{"date":"2009-10-06T06:23:40","version":"1.26_04"},{"date":"2009-10-15T04:05:19","version":"1.26_05"},{"date":"2009-10-28T11:16:12","version":"1.26_06"},{"version":"1.26_07","date":"2009-11-16T01:47:37"},{"version":"1.27","date":"2009-11-23T11:15:09"},{"version":"1.28_01","date":"2009-12-23T11:44:07"},{"date":"2010-01-03T05:56:21","version":"1.28_02"},{"version":"1.29","date":"2010-01-08T09:14:18"},{"date":"2010-03-10T15:55:37","version":"1.30_01"},{"version":"1.30_02","date":"2010-03-30T11:45:57"},{"version":"1.30_03","date":"2010-05-31T03:13:24"},{"version":"1.30_04","date":"2010-08-25T09:25:41"},{"date":"2010-08-27T15:31:59","version":"1.30_05"},{"date":"2010-09-09T01:49:17","version":"1.30_06"},{"version":"1.31","date":"2010-09-15T07:30:11"},{"version":"1.32_01","date":"2010-12-10T05:14:51"},{"version":"1.32_02","date":"2011-03-07T06:57:51"},{"date":"2011-05-12T05:05:38","version":"1.32_03"},{"date":"2011-05-20T02:39:29","version":"1.32_04"},{"date":"2011-05-30T07:39:31","version":"1.33"},{"version":"1.34_01","date":"2011-09-21T16:26:23"},{"date":"2011-10-21T06:13:45","version":"1.34_02"},{"date":"2011-11-01T03:51:19","version":"1.34_03"},{"version":"1.35","date":"2011-11-29T00:16:47"},{"date":"2012-01-19T06:15:08","version":"1.36_01"},{"date":"2012-02-23T04:11:05","version":"1.36_02"},{"date":"2012-05-07T22:56:21","version":"1.36_03"},{"version":"1.36_04","date":"2012-05-19T09:46:14"},{"version":"1.37","date":"2012-06-09T14:43:03"},{"date":"2012-09-24T10:18:25","version":"1.38_01"},{"date":"2013-04-09T05:03:21","version":"1.38_02"},{"date":"2013-05-21T05:14:23","version":"1.38_03"},{"version":"1.38_04","date":"2013-05-29T07:11:57"},{"version":"1.38_05","date":"2013-05-31T04:39:53"},{"version":"1.39","date":"2013-06-09T15:10:40"},{"date":"2013-07-28T05:31:53","version":"1.40"},{"version":"1.41_01","date":"2013-08-27T06:41:37"},{"date":"2013-08-29T18:53:29","version":"1.41_02"},{"version":"1.41_03","date":"2013-09-04T17:57:50"},{"date":"2014-01-12T01:19:09","version":"1.41_04"},{"version":"1.41_05","date":"2014-01-22T03:53:26"},{"version":"1.41_06","date":"2014-02-12T02:53:38"},{"version":"1.41_07","date":"2014-03-13T13:44:52"},{"version":"1.42","date":"2014-03-19T15:29:13"},{"date":"2014-03-25T18:50:08","version":"1.43_01"},{"version":"1.43_02","date":"2014-03-25T19:58:13"},{"date":"2014-06-12T05:01:15","version":"1.43_03"},{"date":"2014-07-21T01:13:47","version":"1.43_04"},{"version":"1.43_05","date":"2014-07-21T05:45:41"},{"version":"1.43_06","date":"2014-07-22T00:31:31"},{"date":"2014-07-29T17:03:09","version":"1.43_07"},{"date":"2014-08-21T09:01:11","version":"1.43_08"},{"date":"2014-10-20T07:50:46","version":"1.43_09"},{"date":"2014-10-22T14:15:00","version":"1.44"},{"version":"1.45_01","date":"2014-10-22T15:33:37"},{"version":"1.45_02","date":"2014-10-23T08:21:27"},{"version":"1.45_03","date":"2014-10-24T17:57:53"},{"version":"1.45_04","date":"2014-10-28T08:28:00"},{"version":"1.45_05","date":"2014-11-25T04:07:43"},{"version":"1.45_06","date":"2014-11-26T08:52:49"},{"date":"2014-12-10T06:23:03","version":"1.46"},{"version":"1.47_01","date":"2015-02-17T07:00:46"},{"date":"2015-04-16T13:30:38","version":"1.47_02"},{"date":"2015-04-16T14:45:00","version":"1.47_03"},{"version":"1.47_04","date":"2015-05-01T17:37:17"},{"date":"2015-05-08T13:49:32","version":"1.47_05"},{"version":"1.48","date":"2015-06-11T16:10:44"},{"date":"2015-08-04T11:18:05","version":"1.49_01"},{"date":"2015-10-10T03:43:45","version":"1.49_02"},{"date":"2015-11-05T05:52:27","version":"1.49_03"},{"date":"2015-11-24T12:59:11","version":"1.49_04"},{"version":"1.49_05","date":"2016-01-11T13:32:43"},{"date":"2016-01-15T03:40:44","version":"1.49_06"},{"version":"1.49_07","date":"2016-01-21T01:11:59"},{"date":"2016-01-30T00:55:58","version":"1.49_08"},{"version":"1.50","date":"2016-02-10T15:04:42"},{"date":"2016-02-20T01:03:50","version":"1.51_01"},{"date":"2016-02-20T01:49:29","version":"1.51_02"},{"version":"1.51_03","date":"2016-02-20T11:06:51"},{"date":"2016-03-07T04:33:35","version":"1.51_04"},{"date":"2016-06-23T01:22:57","version":"1.51_05"},{"version":"1.51_06","date":"2016-10-15T00:21:14"},{"date":"2016-10-16T05:16:29","version":"1.51_07"},{"version":"1.52","date":"2016-11-15T13:02:35"},{"date":"2016-11-26T01:34:30","version":"1.53_01"},{"date":"2016-12-24T02:36:45","version":"1.54"},{"version":"1.55_01","date":"2017-01-03T15:42:47"},{"version":"1.55_02","date":"2017-01-07T16:49:21"},{"version":"1.55_03","date":"2017-02-14T01:31:43"},{"date":"2017-11-21T17:07:32","version":"1.55_04"},{"date":"2017-12-15T18:52:29","version":"1.55_05"},{"date":"2018-01-27T07:33:51","version":"1.55_06"},{"version":"1.55_07","date":"2018-01-27T07:42:58"},{"version":"1.56","date":"2018-02-28T09:01:25"},{"date":"2018-03-21T06:45:29","version":"1.57_01"},{"version":"1.58","date":"2018-03-28T11:56:19"},{"version":"1.59_01","date":"2018-09-16T19:25:50"},{"version":"1.59_02","date":"2018-09-30T06:09:34"},{"version":"1.59_03","date":"2018-11-03T12:14:20"},{"date":"2018-12-01T02:42:29","version":"1.60"},{"date":"2018-12-01T08:01:30","version":"1.61_01"},{"version":"1.61_02","date":"2018-12-01T09:10:18"},{"version":"1.61_03","date":"2018-12-19T13:03:22"},{"date":"2018-12-22T06:37:21","version":"1.61_04"},{"version":"1.62","date":"2018-12-28T17:59:27"},{"date":"2019-01-25T22:31:45","version":"1.63_01"},{"version":"1.63_02","date":"2019-02-13T19:09:44"},{"version":"1.63_03","date":"2019-02-14T16:56:40"},{"date":"2019-05-24T16:39:18","version":"1.63_04"},{"version":"1.63_05","date":"2019-07-11T17:50:51"},{"version":"1.64","date":"2019-08-12T09:02:59"},{"date":"2020-01-18T01:56:18","version":"1.65_01"},{"date":"2020-02-08T13:02:59","version":"1.65_02"},{"version":"1.65_03","date":"2020-07-26T16:42:08"},{"date":"2020-08-30T02:14:15","version":"1.66"},{"date":"2020-11-24T12:57:56","version":"1.67_01"},{"date":"2020-12-05T17:06:24","version":"1.67_02"},{"date":"2021-03-30T21:37:13","version":"1.67_03"},{"date":"2021-05-30T22:56:01","version":"1.67_04"},{"date":"2021-06-12T23:39:11","version":"1.67_05"},{"version":"1.67_06","date":"2021-06-14T03:49:54"},{"version":"1.67_07","date":"2021-06-19T00:57:41"},{"version":"1.68","date":"2021-07-22T05:30:17"},{"version":"1.69_01","date":"2021-07-29T21:09:19"},{"version":"1.69_02","date":"2021-07-30T14:21:39"},{"date":"2021-08-01T10:20:33","version":"1.70"},{"version":"1.71_01","date":"2021-12-01T17:03:29"},{"date":"2022-01-06T20:51:05","version":"1.71_02"},{"version":"1.71_03","date":"2022-02-23T10:49:28"},{"version":"1.71_04","date":"2022-02-26T00:59:40"},{"date":"2022-02-26T02:49:09","version":"1.71_05"},{"version":"1.71_06","date":"2022-03-12T02:54:15"},{"date":"2022-10-25T18:36:30","version":"1.71_07"},{"date":"2022-11-03T16:28:17","version":"1.72"},{"date":"2023-07-09T01:04:52","version":"1.73_01"},{"date":"2023-09-19T17:26:03","version":"1.74"},{"version":"1.75_01","date":"2024-09-17T14:05:40"},{"version":"1.76","date":"2024-10-19T04:47:07"}],"main_module":"DBD::SQLite","advisories":[{"distribution":"DBD-SQLite","description":"In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.\n","reported":"2020-06-27","cves":["CVE-2020-15358"],"fixed_versions":[">=1.65_03"],"id":"CPANSA-DBD-SQLite-2020-15358","affected_versions":["<1.65_03"],"references":["https://www.sqlite.org/src/info/10fa79d00f8091e5","https://www.sqlite.org/src/timeline?p=version-3.32.3&bt=version-3.32.2","https://www.sqlite.org/src/tktview?name=8f157e8010","https://security.netapp.com/advisory/ntap-20200709-0001/","https://security.gentoo.org/glsa/202007-26","https://usn.ubuntu.com/4438-1/","https://www.oracle.com/security-alerts/cpuoct2020.html","https://support.apple.com/kb/HT211931","https://support.apple.com/kb/HT211844","https://support.apple.com/kb/HT211850","https://support.apple.com/kb/HT211843","https://support.apple.com/kb/HT211847","http://seclists.org/fulldisclosure/2020/Nov/19","http://seclists.org/fulldisclosure/2020/Nov/22","http://seclists.org/fulldisclosure/2020/Nov/20","http://seclists.org/fulldisclosure/2020/Dec/32","https://www.oracle.com/security-alerts/cpujan2021.html","https://support.apple.com/kb/HT212147","http://seclists.org/fulldisclosure/2021/Feb/14","https://www.oracle.com/security-alerts/cpuApr2021.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf","https://www.oracle.com/security-alerts/cpuapr2022.html"],"severity":"medium"},{"id":"CPANSA-DBD-SQLite-2020-13632","fixed_versions":[">=1.65_03"],"reported":"2020-05-27","cves":["CVE-2020-13632"],"description":"ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.\n","distribution":"DBD-SQLite","severity":"medium","affected_versions":["<1.65_03"],"references":["https://bugs.chromium.org/p/chromium/issues/detail?id=1080459","https://sqlite.org/src/info/a4dd148928ea65bd","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/","https://security.netapp.com/advisory/ntap-20200608-0002/","https://usn.ubuntu.com/4394-1/","https://www.oracle.com/security-alerts/cpujul2020.html","https://security.gentoo.org/glsa/202007-26","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"]},{"id":"CPANSA-DBD-SQLite-2020-13631","reported":"2020-05-27","fixed_versions":[">=1.65_03"],"cves":["CVE-2020-13631"],"description":"SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.\n","distribution":"DBD-SQLite","severity":"medium","references":["https://bugs.chromium.org/p/chromium/issues/detail?id=1080459","https://sqlite.org/src/info/eca0ba2cf4c0fdf7","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/","https://security.netapp.com/advisory/ntap-20200608-0002/","https://usn.ubuntu.com/4394-1/","https://www.oracle.com/security-alerts/cpujul2020.html","https://security.gentoo.org/glsa/202007-26","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","https://www.oracle.com/security-alerts/cpuoct2020.html","https://support.apple.com/kb/HT211931","https://support.apple.com/kb/HT211844","https://support.apple.com/kb/HT211850","https://support.apple.com/kb/HT211843","https://support.apple.com/kb/HT211952","http://seclists.org/fulldisclosure/2020/Nov/19","http://seclists.org/fulldisclosure/2020/Nov/22","http://seclists.org/fulldisclosure/2020/Nov/20","https://support.apple.com/kb/HT211935","http://seclists.org/fulldisclosure/2020/Dec/32","https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"affected_versions":["<1.65_03"]},{"id":"CPANSA-DBD-SQLite-2020-13630","distribution":"DBD-SQLite","description":"ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.\n","fixed_versions":[">=1.65_03"],"reported":"2020-05-27","cves":["CVE-2020-13630"],"severity":"high","references":["https://bugs.chromium.org/p/chromium/issues/detail?id=1080459","https://sqlite.org/src/info/0d69f76f0865f962","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/","https://security.netapp.com/advisory/ntap-20200608-0002/","https://usn.ubuntu.com/4394-1/","https://www.oracle.com/security-alerts/cpujul2020.html","https://security.gentoo.org/glsa/202007-26","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://support.apple.com/kb/HT211931","https://support.apple.com/kb/HT211844","https://support.apple.com/kb/HT211850","https://support.apple.com/kb/HT211843","https://support.apple.com/kb/HT211952","http://seclists.org/fulldisclosure/2020/Nov/19","http://seclists.org/fulldisclosure/2020/Nov/22","http://seclists.org/fulldisclosure/2020/Nov/20","https://support.apple.com/kb/HT211935","http://seclists.org/fulldisclosure/2020/Dec/32","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"affected_versions":["<1.65_03"]},{"distribution":"DBD-SQLite","description":"SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.\n","reported":"2020-05-24","cves":["CVE-2020-13435"],"fixed_versions":[">=1.65_03"],"id":"CPANSA-DBD-SQLite-2020-13435","references":["https://www.sqlite.org/src/info/7a5279a25c57adf1","https://security.netapp.com/advisory/ntap-20200528-0004/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/","https://usn.ubuntu.com/4394-1/","https://www.oracle.com/security-alerts/cpujul2020.html","https://security.gentoo.org/glsa/202007-26","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","https://support.apple.com/kb/HT211931","https://support.apple.com/kb/HT211844","https://support.apple.com/kb/HT211850","https://support.apple.com/kb/HT211843","https://support.apple.com/kb/HT211952","http://seclists.org/fulldisclosure/2020/Nov/19","http://seclists.org/fulldisclosure/2020/Nov/22","http://seclists.org/fulldisclosure/2020/Nov/20","https://support.apple.com/kb/HT211935","http://seclists.org/fulldisclosure/2020/Dec/32","https://www.oracle.com/security-alerts/cpuApr2021.html"],"affected_versions":["<1.65_03"],"severity":"medium"},{"id":"CPANSA-DBD-SQLite-2020-13434","description":"SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.\n","distribution":"DBD-SQLite","cves":["CVE-2020-13434"],"reported":"2020-05-24","fixed_versions":[">=1.65_03"],"severity":"medium","references":["https://www.sqlite.org/src/info/23439ea582241138","https://www.sqlite.org/src/info/d08d3405878d394e","https://lists.debian.org/debian-lts-announce/2020/05/msg00024.html","https://security.netapp.com/advisory/ntap-20200528-0004/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/","https://usn.ubuntu.com/4394-1/","https://www.oracle.com/security-alerts/cpujul2020.html","https://security.gentoo.org/glsa/202007-26","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://support.apple.com/kb/HT211931","https://support.apple.com/kb/HT211844","https://support.apple.com/kb/HT211850","https://support.apple.com/kb/HT211843","https://support.apple.com/kb/HT211952","http://seclists.org/fulldisclosure/2020/Nov/19","http://seclists.org/fulldisclosure/2020/Nov/22","http://seclists.org/fulldisclosure/2020/Nov/20","https://support.apple.com/kb/HT211935","http://seclists.org/fulldisclosure/2020/Dec/32","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpuapr2022.html"],"affected_versions":["<1.65_03"]},{"distribution":"DBD-SQLite","description":"In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.\n","reported":"2020-04-09","cves":["CVE-2020-11656"],"fixed_versions":[">=1.65_03"],"id":"CPANSA-DBD-SQLite-2020-11656","affected_versions":["<1.65_03"],"references":["https://www3.sqlite.org/cgi/src/info/b64674919f673602","https://www.sqlite.org/src/info/d09f8c3621d5f7f8","https://security.netapp.com/advisory/ntap-20200416-0001/","https://www.oracle.com/security-alerts/cpujul2020.html","https://security.gentoo.org/glsa/202007-26","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.tenable.com/security/tns-2021-14","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"severity":"critical"},{"severity":"high","references":["https://www3.sqlite.org/cgi/src/info/4a302b42c7bf5e11","https://www3.sqlite.org/cgi/src/tktview?name=af4556bb5c","https://security.netapp.com/advisory/ntap-20200416-0001/","https://lists.debian.org/debian-lts-announce/2020/05/msg00006.html","https://usn.ubuntu.com/4394-1/","https://www.oracle.com/security-alerts/cpujul2020.html","https://security.gentoo.org/glsa/202007-26","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.tenable.com/security/tns-2021-14","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"affected_versions":["<1.65_03"],"id":"CPANSA-DBD-SQLite-2020-11655","reported":"2020-04-09","cves":["CVE-2020-11655"],"fixed_versions":[">=1.65_03"],"description":"SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.\n","distribution":"DBD-SQLite"},{"id":"CPANSA-DBD-SQLite-2020-9327","fixed_versions":[">=1.65_03"],"reported":"2020-02-21","cves":["CVE-2020-9327"],"description":"In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.\n","distribution":"DBD-SQLite","severity":"high","affected_versions":["<1.65_03"],"references":["https://www.sqlite.org/cgi/src/info/4374860b29383380","https://www.sqlite.org/cgi/src/info/abc473fb8fb99900","https://www.sqlite.org/cgi/src/info/9d0d4ab95dc0c56e","https://security.netapp.com/advisory/ntap-20200313-0002/","https://security.gentoo.org/glsa/202003-16","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"]},{"reported":"2020-01-02","cves":["CVE-2019-20218"],"fixed_versions":[">=1.65_03"],"distribution":"DBD-SQLite","description":"selectExpander in select.c in SQLite 3.30.1 proceeds with WITH stack unwinding even after a parsing error.\n","id":"CPANSA-DBD-SQLite-2019-20218","references":["https://github.com/sqlite/sqlite/commit/a6c1a71cde082e09750465d5675699062922e387","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://security.gentoo.org/glsa/202007-26","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://lists.debian.org/debian-lts-announce/2020/12/msg00016.html"],"affected_versions":["=1.65_02"],"severity":"high"},{"affected_versions":["=1.65_02"],"references":["https://github.com/sqlite/sqlite/commit/1e490c4ca6b43a9cf8637d695907888349f69bec","https://github.com/sqlite/sqlite/commit/d8f2d46cbc9925e034a68aaaf60aad788d9373c1","https://security.netapp.com/advisory/ntap-20200204-0001/","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpuapr2020.html"],"severity":"high","cves":["CVE-2019-19959"],"reported":"2020-01-03","fixed_versions":[">=1.65_03"],"description":"ext/misc/zipfile.c in SQLite 3.30.1 mishandles certain uses of INSERT INTO in situations involving embedded '\\\\0' characters in filenames, leading to a memory-management error that can be detected by (for example) valgrind.\n","distribution":"DBD-SQLite","id":"CPANSA-DBD-SQLite-2019-19959"},{"id":"CPANSA-DBD-SQLite-2019-19926","description":"multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.\n","distribution":"DBD-SQLite","cves":["CVE-2019-19926","CVE-2019-19880"],"reported":"2019-12-23","fixed_versions":[">=1.65_03"],"severity":"high","affected_versions":["=1.65_02"],"references":["https://github.com/sqlite/sqlite/commit/8428b3b437569338a9d1e10c4cd8154acbe33089","https://security.netapp.com/advisory/ntap-20200114-0003/","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html","https://access.redhat.com/errata/RHSA-2020:0514","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html","https://www.debian.org/security/2020/dsa-4638","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://usn.ubuntu.com/4298-2/","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"]},{"id":"CPANSA-DBD-SQLite-2019-8457","distribution":"DBD-SQLite","description":"SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.\n","reported":"2019-05-30","cves":["CVE-2019-8457"],"fixed_versions":[">=1.63_04"],"severity":"critical","references":["https://www.sqlite.org/src/info/90acdbfce9c08858","https://www.sqlite.org/releaselog/3_28_0.html","https://usn.ubuntu.com/4004-1/","https://usn.ubuntu.com/4004-2/","https://security.netapp.com/advisory/ntap-20190606-0002/","https://usn.ubuntu.com/4019-1/","https://usn.ubuntu.com/4019-2/","http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/","https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://www.oracle.com/security-alerts/cpujan2020.html","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10365"],"affected_versions":[">=1.19_01,<1.63_03"]},{"id":"CPANSA-DBD-SQLite-2019-5018","cves":["CVE-2019-5018"],"reported":"2019-05-10","fixed_versions":[">=1.63_04"],"description":"An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0. A specially crafted SQL command can cause a use after free vulnerability, potentially resulting in remote code execution. An attacker can send a malicious SQL command to trigger this vulnerability.\n","distribution":"DBD-SQLite","severity":"high","references":["https://talosintelligence.com/vulnerability_reports/TALOS-2019-0777","http://www.securityfocus.com/bid/108294","http://packetstormsecurity.com/files/152809/Sqlite3-Window-Function-Remote-Code-Execution.html","https://security.netapp.com/advisory/ntap-20190521-0001/","https://security.gentoo.org/glsa/201908-09","https://usn.ubuntu.com/4205-1/"],"affected_versions":[">=1.61_03,<1.63_03"]},{"affected_versions":["=1.65_02"],"references":["https://github.com/sqlite/sqlite/commit/54d501092d88c0cf89bec4279951f548fb0b8618","https://security.netapp.com/advisory/ntap-20200114-0003/","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html","https://access.redhat.com/errata/RHSA-2020:0514","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html","https://www.debian.org/security/2020/dsa-4638","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"severity":"high","distribution":"DBD-SQLite","description":"zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.\n","fixed_versions":[">=1.65_03"],"reported":"2019-12-24","cves":["CVE-2019-19925"],"id":"CPANSA-DBD-SQLite-2019-19925"},{"id":"CPANSA-DBD-SQLite-2019-19924","fixed_versions":[">=1.65_03"],"reported":"2019-12-24","cves":["CVE-2019-19924"],"description":"SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.\n","distribution":"DBD-SQLite","severity":"medium","references":["https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3","https://security.netapp.com/advisory/ntap-20200114-0003/","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"affected_versions":["=1.65_02"]},{"severity":"high","references":["https://github.com/sqlite/sqlite/commit/396afe6f6aa90a31303c183e11b2b2d4b7956b35","https://security.netapp.com/advisory/ntap-20200114-0003/","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html","https://access.redhat.com/errata/RHSA-2020:0514","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html","https://www.debian.org/security/2020/dsa-4638","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"affected_versions":["=1.65_02"],"id":"CPANSA-DBD-SQLite-2019-19923","reported":"2019-12-24","fixed_versions":[">=1.65_03"],"cves":["CVE-2019-19923"],"description":"flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).\n","distribution":"DBD-SQLite"},{"affected_versions":["=1.65_02"],"references":["https://github.com/sqlite/sqlite/commit/75e95e1fcd52d3ec8282edb75ac8cd0814095d54","https://security.netapp.com/advisory/ntap-20200114-0001/","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html","https://access.redhat.com/errata/RHSA-2020:0514","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html","https://www.debian.org/security/2020/dsa-4638","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"severity":"high","description":"exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.\n","distribution":"DBD-SQLite","cves":["CVE-2019-19880"],"reported":"2019-12-18","fixed_versions":[">=1.65_03"],"id":"CPANSA-DBD-SQLite-2019-19880"},{"distribution":"DBD-SQLite","description":"pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.\n","fixed_versions":[">=1.65_03"],"reported":"2019-12-09","cves":["CVE-2019-19646"],"id":"CPANSA-DBD-SQLite-2019-19646","affected_versions":["<=1.65_02"],"references":["https://github.com/sqlite/sqlite/commit/ebd70eedd5d6e6a890a670b5ee874a5eae86b4dd","https://github.com/sqlite/sqlite/commit/926f796e8feec15f3836aa0a060ed906f8ae04d3","https://www.sqlite.org/","https://security.netapp.com/advisory/ntap-20191223-0001/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.tenable.com/security/tns-2021-14","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"severity":"critical"},{"severity":"medium","affected_versions":["<=1.65_02"],"references":["https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06","https://security.netapp.com/advisory/ntap-20191223-0001/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://usn.ubuntu.com/4394-1/","https://www.tenable.com/security/tns-2021-14","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"id":"CPANSA-DBD-SQLite-2019-19645","description":"alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.\n","distribution":"DBD-SQLite","reported":"2019-12-09","cves":["CVE-2019-19645"],"fixed_versions":[">=1.65_03"]},{"references":["https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13","https://www.sqlite.org/","https://security.netapp.com/advisory/ntap-20191223-0001/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://usn.ubuntu.com/4394-1/","https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"affected_versions":["=1.65_02"],"severity":"high","distribution":"DBD-SQLite","description":"SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.\n","reported":"2019-12-09","fixed_versions":[">=1.65_03"],"cves":["CVE-2019-19603"],"id":"CPANSA-DBD-SQLite-2019-19603"},{"references":["https://github.com/sqlite/sqlite/commit/522ebfa7cee96fb325a22ea3a2464a63485886a8","https://github.com/sqlite/sqlite/commit/73bacb7f93eab9f4bd5a65cbc4ae242acf63c9e3","https://security.netapp.com/advisory/ntap-20191223-0001/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"affected_versions":["=1.65_02"],"severity":"critical","cves":["CVE-2019-19317"],"reported":"2019-12-05","fixed_versions":[">=1.65_03"],"distribution":"DBD-SQLite","description":"lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.\n","id":"CPANSA-DBD-SQLite-2019-19317"},{"references":["https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348","https://usn.ubuntu.com/4205-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"affected_versions":["=1.65_02"],"severity":"high","reported":"2019-11-25","cves":["CVE-2019-19244"],"fixed_versions":[">=1.65_03"],"description":"sqlite3Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.\n","distribution":"DBD-SQLite","id":"CPANSA-DBD-SQLite-2019-19244"},{"affected_versions":["=1.65_02"],"references":["https://github.com/sqlite/sqlite/commit/57f7ece78410a8aae86aa4625fb7556897db384c","https://usn.ubuntu.com/4205-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"severity":"medium","cves":["CVE-2019-19242"],"reported":"2019-11-27","fixed_versions":[">=1.65_03"],"description":"SQLite 3.30.1 mishandles pExpr->y.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.\n","distribution":"DBD-SQLite","id":"CPANSA-DBD-SQLite-2019-19242"},{"severity":"high","references":["https://support.apple.com/kb/HT209451","https://support.apple.com/kb/HT209450","https://support.apple.com/kb/HT209448","https://support.apple.com/kb/HT209447","https://support.apple.com/kb/HT209446","https://support.apple.com/kb/HT209443","https://sqlite.org/src/info/940f2adc8541a838","https://seclists.org/bugtraq/2019/Jan/39","https://seclists.org/bugtraq/2019/Jan/33","https://seclists.org/bugtraq/2019/Jan/32","https://seclists.org/bugtraq/2019/Jan/31","https://seclists.org/bugtraq/2019/Jan/29","https://seclists.org/bugtraq/2019/Jan/28","http://www.securityfocus.com/bid/106698","http://seclists.org/fulldisclosure/2019/Jan/69","http://seclists.org/fulldisclosure/2019/Jan/68","http://seclists.org/fulldisclosure/2019/Jan/67","http://seclists.org/fulldisclosure/2019/Jan/66","http://seclists.org/fulldisclosure/2019/Jan/64","http://seclists.org/fulldisclosure/2019/Jan/62","http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html","https://security.netapp.com/advisory/ntap-20190502-0004/","https://usn.ubuntu.com/4019-1/","https://usn.ubuntu.com/4019-2/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10365"],"affected_versions":["<1.61_01"],"id":"CPANSA-DBD-SQLite-2018-20506","distribution":"DBD-SQLite","description":"SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a \"merge\" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). This is a different vulnerability than CVE-2018-20346.\n","reported":"2019-04-03","fixed_versions":[">=1.61_01"],"cves":["CVE-2018-20506"]},{"id":"CPANSA-DBD-SQLite-2018-20505","reported":"2019-04-03","fixed_versions":[">=1.59_03"],"cves":["CVE-2018-20505"],"distribution":"DBD-SQLite","description":"SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases).\n","severity":"high","references":["https://support.apple.com/kb/HT209451","https://support.apple.com/kb/HT209450","https://support.apple.com/kb/HT209448","https://support.apple.com/kb/HT209447","https://support.apple.com/kb/HT209446","https://support.apple.com/kb/HT209443","https://sqlite.org/src/info/1a84668dcfdebaf12415d","https://seclists.org/bugtraq/2019/Jan/39","https://seclists.org/bugtraq/2019/Jan/33","https://seclists.org/bugtraq/2019/Jan/32","https://seclists.org/bugtraq/2019/Jan/31","https://seclists.org/bugtraq/2019/Jan/29","https://seclists.org/bugtraq/2019/Jan/28","http://www.securityfocus.com/bid/106698","http://seclists.org/fulldisclosure/2019/Jan/69","http://seclists.org/fulldisclosure/2019/Jan/68","http://seclists.org/fulldisclosure/2019/Jan/67","http://seclists.org/fulldisclosure/2019/Jan/66","http://seclists.org/fulldisclosure/2019/Jan/64","http://seclists.org/fulldisclosure/2019/Jan/62","https://security.netapp.com/advisory/ntap-20190502-0004/","https://usn.ubuntu.com/4019-1/"],"affected_versions":["=1.59_02"]},{"id":"CPANSA-DBD-SQLite-2018-20346","reported":"2018-12-21","fixed_versions":[">=1.61_01"],"cves":["CVE-2018-20346"],"distribution":"DBD-SQLite","description":"SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.\n","severity":"high","affected_versions":["<1.61_01"],"references":["https://www.sqlite.org/releaselog/3_25_3.html","https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg113218.html","https://crbug.com/900910","https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e","https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html","https://bugzilla.redhat.com/show_bug.cgi?id=1659677","https://bugzilla.redhat.com/show_bug.cgi?id=1659379","https://blade.tencent.com/magellan/index_en.html","https://access.redhat.com/articles/3758321","https://worthdoingbadly.com/sqlitebug/","https://sqlite.org/src/info/d44318f59044162e","https://sqlite.org/src/info/940f2adc8541a838","https://news.ycombinator.com/item?id=18685296","https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html","https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html","https://www.synology.com/security/advisory/Synology_SA_18_61","http://www.securityfocus.com/bid/106323","https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc","http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html","https://security.gentoo.org/glsa/201904-21","https://usn.ubuntu.com/4019-1/","https://usn.ubuntu.com/4019-2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/","https://support.apple.com/HT209448","https://support.apple.com/HT209447","https://support.apple.com/HT209446","https://support.apple.com/HT209451","https://support.apple.com/HT209443","https://support.apple.com/HT209450","https://www.oracle.com/security-alerts/cpuapr2020.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10365"]},{"severity":"high","references":["https://www.sqlite.org/cgi/src/timeline?r=corrupt-schema","https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1756349","https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6964","https://www.sqlite.org/cgi/src/vdiff?from=1774f1c3baf0bc3d&to=d75e67654aa9620b","http://www.securityfocus.com/bid/103466","https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/","https://usn.ubuntu.com/4205-1/","https://usn.ubuntu.com/4394-1/","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E"],"affected_versions":["<1.59_01"],"id":"CPANSA-DBD-SQLite-2018-8740","description":"In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c.\n","distribution":"DBD-SQLite","fixed_versions":[">=1.59_01"],"reported":"2018-03-17","cves":["CVE-2018-8740"]},{"fixed_versions":[">=1.55_07"],"reported":"2017-07-07","cves":["CVE-2017-10989"],"distribution":"DBD-SQLite","description":"The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact.\n","id":"CPANSA-DBD-SQLite-2017-10989","affected_versions":["=1.55_06","<=1.55_03"],"references":["https://sqlite.org/src/info/66de6f4a","https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1700937","https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2405","https://sqlite.org/src/vpatch?from=0db20efe201736b3&to=66de6f4a9504ec26","http://marc.info/?l=sqlite-users&m=149933696214713&w=2","http://www.securityfocus.com/bid/99502","http://www.securitytracker.com/id/1039427","https://support.apple.com/HT208144","https://support.apple.com/HT208115","https://support.apple.com/HT208113","https://support.apple.com/HT208112","http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html","https://usn.ubuntu.com/4019-1/","https://usn.ubuntu.com/4019-2/"],"severity":"critical"},{"severity":"medium","affected_versions":["<=1.55_01"],"references":["http://www.openwall.com/lists/oss-security/2016/07/01/1","http://www.securityfocus.com/bid/91546","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IGQTH7V45QVHFDXJAEECHEO3HHD644WZ/","https://www.korelogic.com/Resources/Advisories/KL-001-2016-003.txt","https://www.sqlite.org/releaselog/3_13_0.html","http://www.sqlite.org/cgi/src/info/67985761aa93fb61","http://www.openwall.com/lists/oss-security/2016/07/01/2","http://lists.opensuse.org/opensuse-updates/2016-08/msg00053.html","https://www.tenable.com/security/tns-2016-20","https://usn.ubuntu.com/4019-1/","https://usn.ubuntu.com/4019-2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/","https://github.com/briandfoy/cpan-security-advisory/issues/187","https://rt.cpan.org/Public/Bug/Display.html?id=118395"],"id":"CPANSA-DBD-SQLite-2016-6153","distribution":"DBD-SQLite","description":"os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files.\n","reported":"2016-09-26","fixed_versions":[">=1.55_01"],"cves":["CVE-2016-6153"]},{"id":"CPANSA-DBD-SQLite-2015-3416","distribution":"DBD-SQLite","description":"The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.\n","reported":"2015-04-24","cves":["CVE-2015-3416"],"fixed_versions":[">=1.47_02"],"severity":null,"references":["http://www.sqlite.org/src/info/c494171f77dc2e5e04cb6d865e688448f04e5920","http://seclists.org/fulldisclosure/2015/Apr/31","http://www.debian.org/security/2015/dsa-3252","http://www.mandriva.com/security/advisories?name=MDVSA-2015:217","http://www.ubuntu.com/usn/USN-2698-1","https://support.apple.com/HT205267","http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html","http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html","https://support.apple.com/HT205213","http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","http://www.securitytracker.com/id/1033703","https://security.gentoo.org/glsa/201507-05","http://rhn.redhat.com/errata/RHSA-2015-1635.html","http://rhn.redhat.com/errata/RHSA-2015-1634.html","http://www.securityfocus.com/bid/74228","http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"],"affected_versions":["<=1.47_01"]},{"id":"CPANSA-DBD-SQLite-2015-3415","reported":"2015-04-24","fixed_versions":[">=1.47_02"],"cves":["CVE-2015-3415"],"distribution":"DBD-SQLite","description":"The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement.\n","severity":null,"references":["https://www.sqlite.org/src/info/02e3c88fbf6abdcf3975fb0fb71972b0ab30da30","http://seclists.org/fulldisclosure/2015/Apr/31","http://www.debian.org/security/2015/dsa-3252","http://www.mandriva.com/security/advisories?name=MDVSA-2015:217","http://www.ubuntu.com/usn/USN-2698-1","https://support.apple.com/HT205267","http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html","http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html","https://support.apple.com/HT205213","http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","http://www.securitytracker.com/id/1033703","https://security.gentoo.org/glsa/201507-05","http://rhn.redhat.com/errata/RHSA-2015-1635.html","http://www.securityfocus.com/bid/74228","http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"],"affected_versions":["<=1.47_01"]},{"cves":["CVE-2015-3414"],"reported":"2015-04-24","fixed_versions":[">=1.47_02"],"distribution":"DBD-SQLite","description":"SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE\"\"\"\"\"\"\"\" at the end of a SELECT statement.\n","id":"CPANSA-DBD-SQLite-2015-3414","references":["https://www.sqlite.org/src/info/eddc05e7bb31fae74daa86e0504a3478b99fa0f2","http://seclists.org/fulldisclosure/2015/Apr/31","http://www.debian.org/security/2015/dsa-3252","http://www.mandriva.com/security/advisories?name=MDVSA-2015:217","http://www.ubuntu.com/usn/USN-2698-1","https://support.apple.com/HT205267","http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html","http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html","https://support.apple.com/HT205213","http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","http://www.securitytracker.com/id/1033703","https://security.gentoo.org/glsa/201507-05","http://rhn.redhat.com/errata/RHSA-2015-1635.html","http://www.securityfocus.com/bid/74228","http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"],"affected_versions":["<=1.47_01"],"severity":null},{"severity":null,"affected_versions":["=1.47_01"],"references":["https://www.sqlite.org/src/info/520070ec7fbaac73eda0e0123596b7bb3e9a6897","https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1448758","https://www.sqlite.org/src/info/ac5852d6403c9c9628ca0aa7be135c702f000698","http://ubuntu.com/usn/usn-2698-1","http://www.openwall.com/lists/oss-security/2015/07/14/5","http://www.openwall.com/lists/oss-security/2015/07/15/4","http://www.securityfocus.com/bid/76089"],"id":"CPANSA-DBD-SQLite-2013-7443","distribution":"DBD-SQLite","description":"Buffer overflow in the skip-scan optimization in SQLite 3.8.2 allows remote attackers to cause a denial of service (crash) via crafted SQL statements.\n","cves":["CVE-2013-7443"],"reported":"2015-08-12","fixed_versions":[">=1.47_02"]}]},"MIME-tools":{"main_module":"MIME::Body","versions":[{"date":"1996-10-18T13:57:11","version":"2.01"},{"version":"2.02","date":"1996-10-23T19:20:59"},{"version":"2.03","date":"1996-10-28T18:27:36"},{"version":"2.04","date":"1996-11-03T00:35:36"},{"date":"1997-01-13T10:17:14","version":"2.13"},{"date":"1997-01-14T07:05:37","version":"2.14"},{"date":"1997-01-21T03:40:48","version":"3.203"},{"date":"1997-01-22T11:24:13","version":"3.204"},{"date":"1998-01-14T15:44:55","version":"4.111"},{"version":"4.112","date":"1998-01-18T04:23:37"},{"date":"1998-01-20T08:21:18","version":"4.113"},{"version":"4.116","date":"1998-02-14T21:45:26"},{"date":"1998-05-05T14:32:36","version":"4.119"},{"version":"4.121","date":"1998-06-04T13:30:01"},{"date":"1999-02-10T05:39:03","version":"4.122"},{"date":"1999-05-14T13:29:15","version":"4.124"},{"date":"2000-05-24T14:44:21","version":"5.115"},{"date":"2000-05-26T04:46:25","version":"5.116"},{"date":"2000-06-06T16:14:02","version":"5.205"},{"date":"2000-06-08T07:36:13","version":"5.206"},{"version":"5.207","date":"2000-06-09T03:44:00"},{"date":"2000-06-10T08:12:36","version":"5.209"},{"date":"2000-06-20T13:24:34","version":"5.210"},{"version":"5.211","date":"2000-06-24T06:57:34"},{"version":"5.304","date":"2000-07-07T14:46:11"},{"date":"2000-07-20T06:47:41","version":"5.306"},{"version":"5.310","date":"2000-08-15T14:22:44"},{"date":"2000-08-16T05:28:11","version":"5.311"},{"version":"5.313","date":"2000-09-05T04:17:48"},{"date":"2000-09-06T04:59:03","version":"5.314"},{"version":"5.316","date":"2000-09-21T06:14:25"},{"version":"5.404","date":"2000-11-05T15:24:04"},{"version":"5.405","date":"2000-11-06T00:34:39"},{"version":"5.408","date":"2000-11-10T05:27:35"},{"date":"2000-11-20T18:04:43","version":"5.409"},{"version":"5.410","date":"2000-11-23T05:31:08"},{"date":"2001-06-05T15:21:25","version":"5.411"},{"date":"2001-11-16T17:32:32","version":"5.411"},{"version":"6.200_01","date":"2003-06-09T16:42:00"},{"version":"6.200_02","date":"2003-07-22T20:49:42"},{"version":"5.412","date":"2004-09-14T14:20:07"},{"version":"5.413","date":"2004-09-15T14:11:08"},{"date":"2004-10-06T19:46:54","version":"5.414"},{"date":"2004-10-27T12:51:54","version":"5.415"},{"version":"5.416","date":"2005-01-03T15:45:29"},{"date":"2005-01-20T21:24:25","version":"5.417"},{"date":"2005-09-29T19:40:53","version":"5.418"},{"version":"5.419","date":"2005-12-22T21:52:16"},{"version":"5.420","date":"2006-03-17T21:20:12"},{"date":"2007-06-18T20:04:22","version":"5.420_01"},{"date":"2007-08-31T18:03:20","version":"5.420_02"},{"version":"5.421","date":"2007-09-20T21:33:01"},{"date":"2007-09-25T22:31:20","version":"5.422"},{"version":"5.423","date":"2007-09-27T15:50:17"},{"date":"2007-11-07T15:36:31","version":"5.424"},{"version":"5.425","date":"2007-11-17T16:20:42"},{"date":"2008-03-18T13:45:38","version":"5.426"},{"date":"2008-06-30T18:41:00","version":"5.426"},{"version":"5.428","date":"2010-04-22T15:31:33"},{"date":"2010-04-30T13:47:59","version":"5.500"},{"version":"5.500","date":"2011-01-07T15:59:19"},{"date":"2011-02-17T18:37:12","version":"5.501"},{"date":"2011-03-08T14:03:11","version":"5.502"},{"version":"5.503","date":"2012-06-08T13:44:12"},{"version":"5.504","date":"2013-01-30T21:01:40"},{"date":"2013-11-14T15:27:15","version":"5.505"},{"date":"2015-04-22T17:32:26","version":"5.506"},{"version":"5.507","date":"2015-09-30T13:21:56"},{"version":"5.508","date":"2016-08-29T14:52:28"},{"date":"2017-04-05T18:13:30","version":"5.508"},{"date":"2022-07-06T14:20:39","version":"5.503"},{"date":"2024-01-02T15:38:07","version":"5.503"},{"date":"2024-01-08T18:22:18","version":"5.503"},{"version":"5.503","date":"2024-01-25T16:28:54"},{"version":"5.503","date":"2024-02-06T20:49:02"},{"version":"5.515","date":"2024-04-24T15:36:43"}],"advisories":[{"references":["https://metacpan.org/dist/MIME-tools/changes"],"affected_versions":["<4.109"],"severity":null,"reported":"1998-01-10","cves":[],"fixed_versions":[">=4.109"],"description":"There was a potential security hole when outputting entities with recommended filenames.\n","distribution":"MIME-tools","id":"CPANSA-MIME-tools-1998-01"}]},"File-DataClass":{"advisories":[{"id":"CPANSA-File-DataClass-2017-01","description":"Loading modules from . (current directory).\n","distribution":"File-DataClass","cves":["CVE-2016-1238"],"reported":"2017-04-01","fixed_versions":[">=0.72.1"],"references":["https://metacpan.org/changes/distribution/File-DataClass"],"affected_versions":["<0.72.1"]}],"main_module":"File::DataClass","versions":[{"version":"0.1.228","date":"2010-09-29T16:37:04"},{"date":"2010-10-06T14:20:31","version":"0.2.234"},{"date":"2011-01-26T18:14:50","version":"0.3.238"},{"version":"0.3.239","date":"2011-02-27T23:09:38"},{"date":"2011-04-12T19:44:59","version":"0.3.259"},{"version":"0.4.268","date":"2011-05-15T17:45:09"},{"version":"0.5.271","date":"2011-05-30T01:47:40"},{"date":"2011-07-11T13:39:10","version":"0.6.286"},{"version":"0.7.321","date":"2011-11-30T00:05:18"},{"version":"0.7.325","date":"2011-12-02T04:40:20"},{"version":"0.7.326","date":"2011-12-02T22:39:25"},{"date":"2011-12-03T18:43:58","version":"0.7.328"},{"version":"0.7.330","date":"2012-02-22T18:28:29"},{"date":"2012-02-23T11:00:24","version":"0.7.331"},{"version":"0.7.332","date":"2012-02-24T10:52:18"},{"version":"0.7.335","date":"2012-03-12T17:34:58"},{"version":"0.7.336","date":"2012-03-20T18:24:26"},{"date":"2012-03-21T22:43:50","version":"0.7.338"},{"version":"0.7.339","date":"2012-03-22T13:48:59"},{"date":"2012-03-24T00:37:31","version":"0.7.343"},{"date":"2012-03-28T23:58:41","version":"0.8.351"},{"date":"2012-03-29T22:05:21","version":"0.8.355"},{"version":"0.8.357","date":"2012-04-03T00:26:12"},{"date":"2012-04-04T15:19:03","version":"0.8.360"},{"version":"0.9.368","date":"2012-04-17T18:57:01"},{"version":"0.10.380","date":"2012-05-19T21:05:56"},{"version":"0.11.401","date":"2012-07-10T00:34:23"},{"date":"2012-09-02T13:43:37","version":"0.12.406"},{"version":"0.12.409","date":"2012-09-06T14:02:06"},{"version":"0.13.416","date":"2012-11-07T07:49:39"},{"date":"2012-11-13T20:16:27","version":"0.13.418"},{"version":"0.13.420","date":"2012-12-12T23:25:16"},{"version":"0.13.421","date":"2012-12-14T17:58:08"},{"date":"2012-12-19T22:23:08","version":"0.13.422"},{"date":"2012-12-21T20:48:41","version":"0.13.424"},{"version":"0.13.427","date":"2012-12-30T03:05:28"},{"date":"2013-01-07T00:52:48","version":"0.14.429"},{"date":"2013-04-01T01:14:44","version":"0.15.431"},{"date":"2013-04-02T14:21:13","version":"0.15.434"},{"date":"2013-04-14T16:15:55","version":"v0.16.438"},{"date":"2013-04-15T20:42:56","version":"v0.16.442"},{"date":"2013-04-24T03:47:54","version":"v0.16.445"},{"version":"v0.17.450","date":"2013-04-29T17:12:37"},{"date":"2013-04-30T22:15:36","version":"v0.18.6"},{"date":"2013-05-02T14:14:57","version":"v0.19.1"},{"date":"2013-05-07T23:33:06","version":"v0.20.6"},{"version":"v0.20.7","date":"2013-05-10T14:58:03"},{"version":"v0.20.8","date":"2013-05-14T13:32:28"},{"date":"2013-05-15T20:03:34","version":"v0.20.9"},{"date":"2013-05-16T00:11:50","version":"v0.20.10"},{"date":"2013-05-17T16:07:41","version":"v0.20.12"},{"date":"2013-06-08T13:26:40","version":"v0.20.13"},{"date":"2013-07-28T17:41:14","version":"v0.22.1"},{"version":"v0.22.2","date":"2013-07-29T11:39:49"},{"version":"v0.22.3","date":"2013-07-29T11:46:28"},{"version":"v0.22.4","date":"2013-07-29T18:37:14"},{"version":"v0.22.5","date":"2013-07-30T10:19:23"},{"date":"2013-07-30T16:25:59","version":"v0.22.7"},{"date":"2013-07-31T09:54:30","version":"v0.22.8"},{"date":"2013-08-02T19:06:49","version":"v0.22.9"},{"date":"2013-08-06T17:19:31","version":"v0.23.1"},{"version":"v0.23.2","date":"2013-08-07T13:14:13"},{"date":"2013-08-13T18:01:24","version":"0.24.1"},{"date":"2013-08-16T22:49:23","version":"0.24.3"},{"version":"0.25.1","date":"2013-09-03T13:11:17"},{"date":"2013-09-26T16:04:18","version":"0.26.1"},{"version":"0.27.1","date":"2013-11-22T09:42:00"},{"date":"2014-01-01T15:02:23","version":"0.28.1"},{"version":"0.29.1","date":"2014-01-01T17:03:18"},{"date":"2014-01-02T02:33:28","version":"0.30.1"},{"version":"0.31.1","date":"2014-01-13T18:41:29"},{"date":"2014-01-24T20:56:21","version":"0.33.1"},{"version":"0.34.1","date":"2014-04-04T10:52:59"},{"version":"0.35.1","date":"2014-05-01T14:40:32"},{"date":"2014-05-13T10:03:54","version":"0.36.1"},{"version":"0.37.1","date":"2014-05-13T21:08:07"},{"date":"2014-05-15T00:11:43","version":"0.38.1"},{"version":"0.39.1","date":"2014-05-16T08:19:01"},{"date":"2014-05-22T09:37:34","version":"0.40.1"},{"version":"0.40.2","date":"2014-05-22T14:10:49"},{"version":"0.41.1","date":"2014-05-28T10:28:42"},{"version":"0.42.1","date":"2014-07-03T23:27:53"},{"version":"0.42.2","date":"2014-07-04T09:25:10"},{"version":"0.43.1","date":"2014-07-04T12:19:02"},{"version":"0.44.1","date":"2014-07-16T12:39:03"},{"date":"2014-08-18T23:00:05","version":"0.45.1"},{"date":"2014-08-26T12:43:14","version":"0.45.5"},{"version":"0.46.1","date":"2014-08-26T16:41:35"},{"date":"2014-08-27T16:17:50","version":"0.47.1"},{"version":"0.48.1","date":"2014-09-03T22:25:51"},{"date":"2014-10-02T17:39:13","version":"0.48.3"},{"version":"0.49.1","date":"2014-10-02T19:59:28"},{"version":"0.50.1","date":"2014-11-07T18:51:52"},{"version":"0.50.2","date":"2014-11-08T21:45:45"},{"version":"0.50.3","date":"2014-11-09T13:19:50"},{"version":"0.51.1","date":"2014-11-09T15:52:41"},{"date":"2014-11-10T12:44:49","version":"0.52.1"},{"version":"0.53.1","date":"2014-12-19T11:49:49"},{"version":"0.54.1","date":"2014-12-19T22:54:41"},{"date":"2015-02-05T00:04:33","version":"0.55.1"},{"version":"0.56.1","date":"2015-03-19T14:59:03"},{"version":"0.57.1","date":"2015-04-04T20:00:58"},{"version":"0.58.1","date":"2015-04-04T20:16:31"},{"version":"0.59.1","date":"2015-04-05T17:58:31"},{"version":"0.60.1","date":"2015-04-08T23:10:28"},{"date":"2015-05-11T12:15:05","version":"0.61.1"},{"date":"2015-05-24T11:52:28","version":"0.62.1"},{"version":"0.63.1","date":"2015-06-21T21:42:17"},{"version":"0.66.1","date":"2015-08-29T08:58:54"},{"version":"0.67.1","date":"2016-02-01T00:18:43"},{"date":"2016-02-01T14:33:11","version":"0.68.1"},{"version":"0.69.1","date":"2016-07-05T00:36:52"},{"date":"2016-07-29T15:24:24","version":"0.70.1"},{"version":"0.71.1","date":"2016-07-29T18:59:13"},{"version":"0.72.1","date":"2017-04-02T08:23:47"},{"date":"2017-06-02T00:03:17","version":"0.73.1"}]},"Apache-Session-LDAP":{"advisories":[{"description":"In Apache::Session::LDAP before 0.5, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.\n","distribution":"Apache-Session-LDAP","reported":"2023-01-27","cves":["CVE-2020-36658"],"fixed_versions":[">=0.5"],"id":"CPANSA-Apache-Session-LDAP-2020-36658","references":["https://github.com/LemonLDAPNG/Apache-Session-LDAP/commit/490722b71eed1ed1ab33d58c78578f23e043561f","https://lists.debian.org/debian-lts-announce/2023/01/msg00024.html"],"affected_versions":["<0.5"],"severity":null}],"versions":[{"version":"0.01","date":"2009-04-18T17:09:10"},{"version":"0.02","date":"2009-04-18T19:43:50"},{"version":"0.1","date":"2010-12-08T15:30:51"},{"date":"2012-06-26T04:22:47","version":"0.2"},{"date":"2014-10-24T12:21:07","version":"0.2"},{"date":"2015-06-12T15:47:40","version":"0.4"},{"version":"0.2","date":"2020-09-06T13:13:20"}],"main_module":"Apache::Session::LDAP"},"Crypt-CBC":{"versions":[{"date":"1998-06-19T19:48:52","version":"1.00"},{"date":"1998-09-22T18:30:35","version":"1.10"},{"date":"1998-12-20T23:36:49","version":"1.20"},{"date":"2000-01-27T00:27:56","version":"1.22"},{"date":"2000-02-22T15:20:56","version":"1.23"},{"date":"2000-06-07T18:55:59","version":"1.24"},{"date":"2000-06-08T15:59:07","version":"1.25"},{"date":"2001-12-10T17:16:25","version":"2.01"},{"version":"2.02","date":"2002-01-24T05:30:16"},{"version":"2.03","date":"2002-06-02T18:40:15"},{"version":"2.04","date":"2002-06-12T02:20:51"},{"version":"2.05","date":"2002-06-22T13:02:09"},{"date":"2002-08-08T18:47:49","version":"2.07"},{"version":"2.08","date":"2002-09-11T12:17:23"},{"date":"2004-05-27T15:20:52","version":"2.09"},{"date":"2004-05-29T17:29:19","version":"2.10"},{"date":"2004-06-03T16:22:32","version":"2.11"},{"date":"2004-06-17T15:55:19","version":"2.11"},{"version":"2.14","date":"2005-05-05T20:11:50"},{"date":"2005-08-01T14:02:45","version":"2.15"},{"date":"2006-02-16T14:08:57","version":"2.17"},{"date":"2006-06-06T23:22:02","version":"2.18"},{"date":"2006-08-12T19:52:11","version":"2.19"},{"version":"2.21","date":"2006-10-16T23:40:13"},{"date":"2006-10-29T21:55:34","version":"2.22"},{"version":"2.24","date":"2007-09-28T15:25:53"},{"date":"2008-03-28T14:17:29","version":"2.27"},{"date":"2008-03-31T14:56:52","version":"2.28"},{"date":"2008-04-22T14:27:07","version":"2.29"},{"version":"2.30","date":"2008-09-30T15:17:58"},{"date":"2012-10-30T11:08:06","version":"2.31"},{"date":"2012-12-14T19:30:14","version":"2.32"},{"date":"2013-07-30T20:03:53","version":"2.33"},{"version":"3.00","date":"2021-02-07T15:30:51"},{"version":"3.01","date":"2021-02-08T21:38:16"},{"date":"2021-04-11T22:16:48","version":"3.02"},{"version":"3.03","date":"2021-04-19T02:59:12"},{"date":"2021-05-17T15:03:53","version":"3.04"}],"main_module":"Crypt::CBC","advisories":[{"references":["https://metacpan.org/changes/distribution/Crypt-CBC","https://github.com/briandfoy/cpan-security-advisory/issues/165"],"affected_versions":["<3.04"],"severity":null,"description":"Fixed bug involving manually-specified IV not being used in some circumstances.\n","distribution":"Crypt-CBC","reported":"2021-05-17","cves":[],"fixed_versions":[">=3.04"],"id":"CPANSA-Crypt-CBC-2021-0001"},{"references":["https://metacpan.org/changes/distribution/Crypt-CBC","http://www.securityfocus.com/bid/16802","http://secunia.com/advisories/18755","http://www.debian.org/security/2006/dsa-996","http://secunia.com/advisories/19187","http://www.gentoo.org/security/en/glsa/glsa-200603-15.xml","http://secunia.com/advisories/19303","http://www.novell.com/linux/security/advisories/2006_38_security.html","http://secunia.com/advisories/20899","http://securityreason.com/securityalert/488","http://www.redhat.com/support/errata/RHSA-2008-0261.html","http://secunia.com/advisories/31493","http://rhn.redhat.com/errata/RHSA-2008-0630.html","https://exchange.xforce.ibmcloud.com/vulnerabilities/24954","http://www.securityfocus.com/archive/1/425966/100/0/threaded"],"affected_versions":["<2.17"],"severity":null,"distribution":"Crypt-CBC","description":"Crypt::CBC Perl module 2.16 and earlier, when running in RandomIV mode, uses an initialization vector (IV) of 8 bytes, which results in weaker encryption when used with a cipher that requires a larger block size than 8 bytes, such as Rijndael.\n","reported":"2006-02-25","cves":["CVE-2006-0898"],"fixed_versions":[">=2.17"],"id":"CPANSA-Crypt-CBC-2006-0898"},{"affected_versions":[">=1.21"],"references":["https://metacpan.org/dist/Crypt-CBC/source/lib/Crypt/CBC.pm#L777","https://perldoc.perl.org/functions/rand","https://security.metacpan.org/docs/guides/random-data-for-security.html","https://github.com/lstein/Lib-Crypt-CBC/issues/9"],"severity":null,"distribution":"Crypt-CBC","description":"Crypt::CBC versions between 1.21 and 3.04 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where \"/dev/urandom'\" is unavailable.  In that case, Crypt::CBC will fallback to use the insecure rand() function.","cves":["CVE-2025-2814"],"reported":"2025-04-13","fixed_versions":[],"id":"CPANSA-Crypt-CBC-2025-2814"}]},"RTMP-Client":{"versions":[{"version":"0.01","date":"2011-07-26T08:17:20"},{"version":"0.02","date":"2011-07-27T02:09:05"},{"version":"0.03","date":"2011-07-27T02:17:06"},{"date":"2011-12-01T08:59:19","version":"0.04"}],"main_module":"RTMP::Client","advisories":[{"id":"CPANSA-RTMP-Client-2011-01","cves":[],"reported":"2011-12-01","fixed_versions":[">=0.04"],"distribution":"RTMP-Client","description":"TBD\n","affected_versions":["<0.04"],"references":["https://metacpan.org/changes/distribution/RTMP-Client"]}]},"CPAN":{"main_module":"CPAN","versions":[{"date":"1996-09-10T17:13:59","version":"0.17"},{"date":"1996-09-10T20:51:00","version":"0.20"},{"date":"1996-09-12T05:53:35","version":"0.26"},{"date":"1996-09-12T14:01:39","version":"0.27"},{"date":"1996-09-16T20:18:59","version":"0.28"},{"date":"1996-09-17T17:14:51","version":"0.29"},{"date":"1996-09-19T05:24:17","version":"0.30"},{"date":"1996-09-20T10:40:01","version":"0.31"},{"date":"1996-09-22T19:30:33","version":"0.35"},{"date":"1996-09-23T12:55:23","version":"0.36"},{"date":"1996-09-23T14:05:44","version":"0.37"},{"date":"1996-09-27T12:52:07","version":"0.39"},{"date":"1996-09-28T20:51:31","version":"0.40"},{"date":"1996-10-01T21:14:27","version":"0.41"},{"date":"1996-11-17T07:56:02","version":"0.42"},{"version":"0.43","date":"1996-11-17T14:51:59"},{"version":"0.44","date":"1996-11-30T17:04:28"},{"date":"1996-12-01T12:19:19","version":"0.45"},{"version":"0.46","date":"1996-12-01T18:24:17"},{"date":"1996-12-10T00:58:25","version":"1.00"},{"date":"1996-12-10T10:17:15","version":"1.01"},{"version":"1.02","date":"1996-12-11T01:31:55"},{"date":"1996-12-21T03:10:23","version":"1.03"},{"date":"1996-12-21T20:08:49","version":"1.04"},{"date":"1996-12-22T13:04:58","version":"1.05"},{"version":"1.06","date":"1996-12-22T14:16:08"},{"date":"1996-12-23T04:05:01","version":"1.07"},{"date":"1996-12-23T13:18:01","version":"1.08"},{"date":"1996-12-24T00:46:19","version":"1.09"},{"version":"1.09_01","date":"1997-01-17T02:29:49"},{"version":"1.10","date":"1997-01-21T01:06:40"},{"date":"1997-01-22T18:50:00","version":"1.11"},{"version":"1.12","date":"1997-01-23T00:07:58"},{"date":"1997-01-24T01:07:44","version":"1.14"},{"date":"1997-01-24T12:32:12","version":"1.15"},{"version":"1.16_01","date":"1997-02-02T13:51:48"},{"version":"1.17","date":"1997-02-02T21:05:12"},{"date":"1997-02-03T00:38:36","version":"1.18"},{"version":"1.19","date":"1997-02-03T09:13:48"},{"date":"1997-02-05T09:38:00","version":"1.20"},{"version":"1.21","date":"1997-02-11T06:32:42"},{"version":"1.22_01","date":"1997-03-13T23:14:59"},{"version":"1.23","date":"1997-03-31T12:03:55"},{"version":"1.24","date":"1997-03-31T22:47:11"},{"date":"1997-06-30T18:13:23","version":"1.25"},{"date":"1997-07-28T13:58:09","version":"1.27"},{"version":"1.28","date":"1997-08-04T06:09:33"},{"version":"1.29","date":"1997-08-11T23:33:58"},{"date":"1997-08-29T14:34:37","version":"1.30"},{"date":"1997-09-21T08:53:03","version":"1.31"},{"version":"1.3101","date":"1997-09-23T18:45:50"},{"version":"1.32","date":"1998-01-02T18:22:35"},{"date":"1998-01-10T18:24:23","version":"1.33"},{"date":"1998-02-03T18:06:41","version":"1.35"},{"date":"1998-02-08T08:55:55","version":"1.36"},{"version":"1.37","date":"1998-06-12T06:51:25"},{"version":"1.38","date":"1998-06-14T20:18:08"},{"date":"1998-07-24T20:13:41","version":"1.40"},{"version":"1.41","date":"1998-12-01T02:20:32"},{"date":"1998-12-01T07:58:35","version":"1.42"},{"date":"1998-12-01T22:16:27","version":"1.43"},{"version":"1.43","date":"1998-12-03T17:07:54"},{"date":"1999-01-09T18:38:33","version":"1.44"},{"version":"1.44_51","date":"1999-01-10T19:38:27"},{"version":"1.44_52","date":"1999-01-13T12:15:42"},{"version":"1.44_53","date":"1999-01-15T09:26:40"},{"version":"1.44_54","date":"1999-01-15T09:27:45"},{"version":"1.45","date":"1999-01-23T14:56:16"},{"date":"1999-01-25T01:43:42","version":"1.46"},{"version":"1.47","date":"1999-01-25T13:11:23"},{"date":"1999-03-06T19:34:54","version":"1.48"},{"date":"1999-05-22T16:45:00","version":"1.49"},{"date":"1999-05-23T14:32:20","version":"1.50"},{"version":"1.50_01","date":"1999-10-23T03:06:39"},{"version":"1.51","date":"1999-12-29T22:30:22"},{"date":"2000-01-08T15:32:55","version":"1.52"},{"date":"2000-03-23T23:39:41","version":"1.53"},{"version":"1.54","date":"2000-03-25T22:51:15"},{"version":"1.55","date":"2000-07-30T11:15:04"},{"date":"2000-08-01T20:47:09","version":"1.56"},{"date":"2000-08-16T12:54:07","version":"1.57"},{"date":"2000-08-21T19:44:18","version":"1.57_51"},{"date":"2000-08-27T22:09:36","version":"1.57_53"},{"version":"1.57_54","date":"2000-08-30T16:54:50"},{"version":"1.57_55","date":"2000-08-31T08:11:01"},{"version":"1.57_56","date":"2000-08-31T22:16:21"},{"version":"1.57_57","date":"2000-09-01T12:18:43"},{"version":"1.57_58","date":"2000-09-03T22:19:20"},{"date":"2000-09-05T09:44:05","version":"1.57_59"},{"version":"1.57_60","date":"2000-09-05T19:55:34"},{"version":"1.57_61","date":"2000-09-06T10:54:07"},{"version":"1.57_62","date":"2000-09-08T02:19:06"},{"date":"2000-09-10T08:54:37","version":"1.57_65"},{"date":"2000-09-12T08:46:40","version":"1.57_66"},{"version":"1.57_67","date":"2000-09-17T10:24:31"},{"version":"1.57_68","date":"2000-10-08T14:25:04"},{"version":"1.58","date":"2000-10-18T14:53:45"},{"version":"1.58_51","date":"2000-10-21T14:21:06"},{"date":"2000-10-25T07:05:38","version":"1.58_52"},{"version":"1.58_53","date":"2000-10-26T11:03:29"},{"date":"2000-10-26T15:34:21","version":"1.58_54"},{"date":"2000-10-27T07:59:03","version":"1.58_55"},{"date":"2000-11-04T09:36:53","version":"1.58_56"},{"date":"2000-11-06T19:30:27","version":"1.58_57"},{"date":"2000-11-08T08:10:51","version":"1.58_90"},{"date":"2000-11-13T10:26:38","version":"1.58_91"},{"version":"1.58_92","date":"2000-11-14T18:24:18"},{"version":"1.58_93","date":"2000-11-15T07:19:56"},{"date":"2000-12-01T06:05:58","version":"1.59"},{"date":"2000-12-01T08:19:58","version":"1.59_51"},{"version":"1.59_52","date":"2000-12-26T13:54:06"},{"date":"2001-01-02T16:37:24","version":"1.59_53"},{"version":"1.59_54","date":"2001-02-09T21:44:55"},{"version":"1.60","date":"2002-04-19T13:29:54"},{"date":"2002-04-20T02:18:41","version":"1.60"},{"version":"1.60","date":"2002-04-21T11:31:25"},{"version":"1.61","date":"2002-05-07T10:38:54"},{"date":"2002-07-28T10:51:47","version":"1.62"},{"date":"2002-08-30T08:58:10","version":"1.63"},{"date":"2003-02-06T10:04:06","version":"1.64"},{"date":"2003-02-08T17:10:13","version":"1.65"},{"date":"2003-03-04T19:38:21","version":"1.70"},{"version":"1.70_52","date":"2003-04-11T04:33:18"},{"date":"2003-04-13T12:43:40","version":"1.70_53"},{"version":"1.70_54","date":"2003-05-15T21:04:52"},{"date":"2003-07-04T09:48:08","version":"1.71"},{"version":"1.72","date":"2003-07-27T20:35:05"},{"date":"2003-07-28T08:21:47","version":"1.73"},{"date":"2003-07-28T22:58:08","version":"1.74"},{"date":"2003-07-29T15:14:13","version":"1.75"},{"date":"2003-07-31T15:14:02","version":"1.76"},{"version":"1.76_01","date":"2003-09-21T21:25:41"},{"version":"1.76_51","date":"2005-09-19T06:37:38"},{"date":"2005-09-22T07:02:02","version":"1.76_52"},{"date":"2005-09-22T07:09:48","version":"1.76_53"},{"date":"2005-10-01T08:23:38","version":"1.76_54"},{"version":"1.76_55","date":"2005-10-19T06:10:58"},{"version":"1.76_56","date":"2005-10-21T04:59:36"},{"date":"2005-10-27T07:08:29","version":"1.76_57"},{"version":"1.76_58","date":"2005-11-02T04:03:28"},{"version":"1.76_59","date":"2005-11-03T06:37:52"},{"date":"2005-11-03T07:38:40","version":"1.76_60"},{"date":"2005-11-06T10:36:53","version":"1.76_61"},{"version":"1.76_62","date":"2005-11-07T04:22:19"},{"version":"1.76_63","date":"2005-11-07T04:47:05"},{"date":"2005-11-07T21:58:06","version":"1.76_64"},{"version":"1.76_65","date":"2005-11-07T22:18:44"},{"date":"2005-12-03T10:12:08","version":"1.80"},{"version":"1.80_51","date":"2005-12-18T11:29:26"},{"version":"1.80_53","date":"2005-12-21T12:13:15"},{"date":"2005-12-22T08:42:59","version":"1.80_54"},{"date":"2005-12-24T07:25:34","version":"1.80_55"},{"version":"1.80_56","date":"2005-12-24T09:59:47"},{"version":"1.80_57","date":"2005-12-31T11:58:10"},{"date":"2006-01-01T09:01:43","version":"1.80_58"},{"date":"2006-01-02T23:15:15","version":"1.81"},{"version":"1.82","date":"2006-01-04T07:47:25"},{"version":"1.83","date":"2006-01-05T08:03:36"},{"version":"1.83_51","date":"2006-01-08T13:35:16"},{"version":"1.83_52","date":"2006-01-10T05:00:26"},{"version":"1.83_53","date":"2006-01-12T07:54:36"},{"date":"2006-01-13T08:20:42","version":"1.83_54"},{"version":"1.83_55","date":"2006-01-14T11:34:47"},{"version":"1.83_56","date":"2006-01-18T06:03:44"},{"date":"2006-01-19T08:00:02","version":"1.83_57"},{"version":"1.83_58","date":"2006-01-22T12:05:01"},{"version":"1.83_59","date":"2006-01-25T13:10:20"},{"date":"2006-01-30T10:35:47","version":"1.83_60"},{"date":"2006-01-30T23:18:09","version":"1.83_61"},{"date":"2006-01-31T10:28:57","version":"1.83_62"},{"date":"2006-02-01T07:49:36","version":"1.83_63"},{"date":"2006-02-02T09:17:39","version":"1.83_64"},{"version":"1.83_65","date":"2006-02-04T11:20:05"},{"version":"1.83_66","date":"2006-02-04T17:05:00"},{"version":"1.83_67","date":"2006-02-06T00:46:27"},{"date":"2006-02-08T07:43:36","version":"1.83_68"},{"version":"1.83_69","date":"2006-02-14T08:17:55"},{"version":"1.84","date":"2006-02-15T07:01:02"},{"version":"1.85","date":"2006-02-19T17:05:36"},{"date":"2006-02-20T08:36:51","version":"1.86"},{"date":"2006-02-21T06:05:05","version":"1.86_51"},{"version":"1.86_52","date":"2006-02-22T22:29:54"},{"date":"2006-02-24T08:24:09","version":"1.86_53"},{"date":"2006-02-27T07:01:10","version":"1.87"},{"version":"1.87_51","date":"2006-03-06T08:02:28"},{"date":"2006-07-21T22:33:11","version":"1.87_52"},{"version":"1.87_53","date":"2006-07-22T18:55:13"},{"version":"1.87_54","date":"2006-07-23T21:37:11"},{"date":"2006-07-29T19:36:50","version":"1.87_55"},{"date":"2006-08-24T05:57:41","version":"1.87_56"},{"date":"2006-08-26T17:05:56","version":"1.87_57"},{"date":"2006-08-31T06:50:49","version":"1.87_58"},{"date":"2006-09-03T21:05:29","version":"1.87_59"},{"version":"1.87_61","date":"2006-09-10T11:57:33"},{"date":"2006-09-11T21:24:18","version":"1.87_62"},{"version":"1.87_63","date":"2006-09-13T05:44:15"},{"version":"1.87_64","date":"2006-09-16T11:02:25"},{"date":"2006-09-19T03:44:51","version":"1.87_65"},{"date":"2006-09-21T20:30:41","version":"1.88"},{"version":"1.8801","date":"2006-09-22T20:40:40"},{"version":"1.88_51","date":"2006-09-30T10:41:20"},{"version":"1.88_52","date":"2006-10-03T09:51:49"},{"version":"1.88_53","date":"2006-10-09T19:31:56"},{"version":"1.88_54","date":"2006-10-14T09:37:15"},{"version":"1.88_55","date":"2006-10-16T06:59:27"},{"version":"1.88_56","date":"2006-10-22T10:34:16"},{"version":"1.8802","date":"2006-10-23T07:17:30"},{"date":"2006-10-24T07:18:16","version":"1.88_57"},{"date":"2006-10-28T15:00:07","version":"1.88_58"},{"version":"1.88_59","date":"2006-11-05T21:24:52"},{"version":"1.88_61","date":"2006-11-10T08:39:55"},{"date":"2006-11-13T07:44:27","version":"1.88_62"},{"version":"1.88_63","date":"2006-11-29T08:11:50"},{"version":"1.88_64","date":"2006-12-04T07:53:37"},{"date":"2006-12-11T21:36:04","version":"1.88_65"},{"date":"2006-12-19T08:21:17","version":"1.88_66"},{"date":"2006-12-31T17:18:53","version":"1.88_67"},{"date":"2007-01-07T21:22:12","version":"1.88_68"},{"date":"2007-01-08T03:42:56","version":"1.88_69"},{"date":"2007-01-27T16:57:49","version":"1.88_71"},{"version":"1.88_72","date":"2007-01-31T07:11:33"},{"version":"1.88_73","date":"2007-02-13T05:24:13"},{"version":"1.88_74","date":"2007-02-15T07:12:17"},{"version":"1.88_75","date":"2007-02-18T16:52:49"},{"date":"2007-02-19T06:20:20","version":"1.88_76"},{"version":"1.88_77","date":"2007-02-19T21:26:47"},{"date":"2007-03-05T23:26:57","version":"1.88_78"},{"date":"2007-03-16T01:54:55","version":"1.88_79"},{"version":"1.90","date":"2007-04-07T07:41:18"},{"date":"2007-04-19T07:03:03","version":"1.91"},{"version":"1.9101","date":"2007-04-23T00:09:11"},{"version":"1.9102","date":"2007-05-08T20:35:04"},{"version":"1.91_51","date":"2007-07-07T16:15:40"},{"version":"1.91_52","date":"2007-07-14T18:45:58"},{"version":"1.91_53","date":"2007-08-09T06:49:38"},{"version":"1.91_54","date":"2007-09-14T21:18:33"},{"version":"1.91_55","date":"2007-09-15T07:14:26"},{"date":"2007-09-23T11:15:08","version":"1.92"},{"version":"1.9201","date":"2007-09-27T07:11:10"},{"date":"2007-09-28T06:58:04","version":"1.9202"},{"version":"1.9203","date":"2007-09-28T07:13:26"},{"date":"2007-11-04T23:04:18","version":"1.92_51"},{"version":"1.9204","date":"2007-11-05T23:30:06"},{"version":"1.92_52","date":"2007-11-11T11:27:20"},{"version":"1.9205","date":"2007-11-11T18:49:37"},{"date":"2007-12-09T23:27:18","version":"1.92_53"},{"version":"1.92_54","date":"2007-12-27T04:57:34"},{"date":"2007-12-30T15:24:13","version":"1.92_55"},{"version":"1.92_56","date":"2008-02-04T21:56:28"},{"version":"1.92_57","date":"2008-02-27T05:13:49"},{"date":"2008-03-12T07:56:18","version":"1.92_58"},{"version":"1.92_59","date":"2008-03-16T18:57:04"},{"version":"1.92_60","date":"2008-03-26T07:53:08"},{"date":"2008-04-25T04:47:52","version":"1.92_61"},{"date":"2008-05-23T04:07:04","version":"1.92_62"},{"date":"2008-06-19T06:42:18","version":"1.92_63"},{"date":"2008-09-03T05:27:35","version":"1.92_64"},{"date":"2008-09-14T09:54:03","version":"1.92_65"},{"date":"2008-09-29T23:15:10","version":"1.92_66"},{"version":"1.93","date":"2008-10-12T16:07:51"},{"date":"2008-10-13T19:37:43","version":"1.9301"},{"date":"2009-01-11T22:07:01","version":"1.93_02"},{"date":"2009-02-01T12:38:23","version":"1.93_03"},{"version":"1.93_51","date":"2009-02-01T21:06:21"},{"version":"1.9304","date":"2009-02-28T15:58:39"},{"date":"2009-04-13T19:24:43","version":"1.93_52"},{"version":"1.93_53","date":"2009-05-04T06:11:28"},{"date":"2009-05-07T20:13:16","version":"1.93_54"},{"date":"2009-05-24T05:37:28","version":"1.94"},{"version":"1.94_01","date":"2009-06-14T19:53:52"},{"version":"1.9402","date":"2009-06-27T02:55:22"},{"version":"1.94_51","date":"2009-09-14T02:47:24"},{"version":"1.94_52","date":"2009-10-15T19:33:19"},{"date":"2009-12-18T07:00:09","version":"1.94_53"},{"date":"2010-01-14T08:01:42","version":"1.94_54"},{"date":"2010-02-03T03:43:49","version":"1.94_55"},{"version":"1.94_56","date":"2010-02-17T13:39:33"},{"date":"2010-05-24T19:33:41","version":"1.94_57"},{"date":"2010-06-24T06:34:13","version":"1.94_58"},{"date":"2010-09-26T20:23:30","version":"1.94_59"},{"version":"1.94_60","date":"2010-09-28T20:44:58"},{"date":"2010-10-03T17:29:37","version":"1.94_61"},{"version":"1.94_62","date":"2010-10-26T06:43:51"},{"date":"2011-01-16T17:58:10","version":"1.94_63"},{"version":"1.94_64","date":"2011-01-21T04:58:35"},{"date":"2011-02-14T12:10:12","version":"1.94_65"},{"date":"2011-03-12T11:30:03","version":"1.9600"},{"version":"1.97_51","date":"2011-06-27T06:56:01"},{"version":"1.9800","date":"2011-08-07T09:40:33"},{"version":"1.99_51","date":"2012-10-16T21:42:49"},{"date":"2013-02-06T07:41:54","version":"2.00-TRIAL"},{"date":"2013-04-12T16:57:44","version":"2.00"},{"date":"2013-06-22T20:27:32","version":"2.01-TRIAL"},{"version":"2.02-TRIAL","date":"2013-06-23T07:33:40"},{"date":"2013-09-15T09:42:33","version":"2.03-TRIAL"},{"version":"2.04-TRIAL","date":"2014-03-18T22:33:22"},{"version":"2.05-TRIAL","date":"2014-03-31T20:55:24"},{"version":"2.05-TRIAL2","date":"2014-04-04T02:07:20"},{"version":"2.05","date":"2014-04-18T13:35:51"},{"version":"2.06-TRIAL","date":"2014-08-06T19:32:53"},{"version":"2.06-TRIAL","date":"2015-01-04T18:54:54"},{"version":"2.08-TRIAL","date":"2015-01-05T06:31:55"},{"version":"2.09-TRIAL","date":"2015-02-02T04:41:02"},{"date":"2015-02-22T15:57:42","version":"2.10-TRIAL"},{"date":"2015-03-13T07:45:04","version":"2.10"},{"date":"2015-12-31T11:00:08","version":"2.12-TRIAL"},{"version":"2.13-TRIAL","date":"2016-05-16T09:56:01"},{"version":"2.14-TRIAL","date":"2016-06-04T14:41:28"},{"version":"2.14","date":"2016-06-25T04:32:45"},{"version":"2.15-TRIAL","date":"2016-07-17T12:10:30"},{"date":"2017-01-16T16:20:27","version":"2.16-TRIAL"},{"date":"2017-01-16T21:27:06","version":"2.16-TRIAL2"},{"version":"2.16","date":"2017-02-14T16:22:20"},{"version":"2.17-TRIAL","date":"2017-02-15T09:37:10"},{"date":"2017-02-16T09:48:46","version":"2.17-TRIAL2"},{"date":"2017-03-30T21:38:23","version":"2.18-TRIAL"},{"date":"2017-11-04T23:27:47","version":"2.19-TRIAL"},{"version":"2.20-TRIAL","date":"2017-11-26T22:10:39"},{"date":"2018-09-22T20:46:35","version":"2.21-TRIAL"},{"version":"2.22-TRIAL","date":"2018-12-16T10:35:04"},{"version":"2.22","date":"2018-12-23T09:11:29"},{"date":"2019-02-10T20:28:53","version":"2.23-TRIAL"},{"version":"2.24-TRIAL","date":"2019-02-14T21:21:03"},{"date":"2019-02-16T05:56:23","version":"2.25-TRIAL"},{"date":"2019-03-03T06:27:10","version":"2.25"},{"version":"2.26","date":"2019-03-19T00:04:34"},{"date":"2019-05-31T21:11:50","version":"2.27-TRIAL"},{"date":"2019-06-09T05:48:20","version":"2.27-TRIAL2"},{"version":"2.27","date":"2019-07-03T20:15:40"},{"date":"2020-04-03T02:52:43","version":"2.28-TRIAL"},{"date":"2020-06-13T04:57:39","version":"2.28"},{"date":"2021-11-23T16:58:45","version":"2.29"},{"version":"2.30-TRIAL","date":"2021-12-12T09:16:03"},{"date":"2021-12-14T20:52:30","version":"2.31-TRIAL"},{"date":"2021-12-26T21:35:55","version":"2.32-TRIAL"},{"version":"2.33-TRIAL","date":"2022-01-21T04:09:07"},{"version":"2.33","date":"2022-03-27T17:53:47"},{"date":"2022-04-03T19:19:13","version":"2.34-TRIAL"},{"version":"2.34","date":"2022-04-17T17:40:25"},{"date":"2023-04-15T14:44:27","version":"2.35-TRIAL"},{"version":"2.35","date":"2023-04-27T13:05:07"},{"version":"2.36-TRIAL","date":"2023-05-10T07:08:30"},{"date":"2023-05-14T19:36:11","version":"2.36"},{"date":"2024-08-18T17:03:50","version":"2.37-TRIAL"},{"version":"2.37","date":"2024-08-30T17:18:31"},{"version":"2.38-TRIAL","date":"2024-10-03T10:21:39"},{"date":"2024-10-13T11:32:53","version":"2.38-TRIAL2"},{"date":"2024-11-17T19:52:34","version":"2.38"},{"perl_release":"5.004","dual_lived":1,"version":"1.2401","date":"1997-05-15T00:00:00"},{"date":"1998-07-22T00:00:00","version":"1.3901","dual_lived":1,"perl_release":"5.005"},{"date":"2002-03-05T00:00:00","dual_lived":1,"version":"1.59_56","perl_release":"5.007003"},{"date":"2006-01-31T00:00:00","version":"1.76_02","dual_lived":1,"perl_release":"5.008008"},{"date":"2009-12-20T00:00:00","perl_release":"5.011003","dual_lived":1,"version":"1.94_5301"},{"date":"2011-09-26T00:00:00","version":"1.9600_01","dual_lived":1,"perl_release":"5.014002"},{"date":"2013-09-20T00:00:00","dual_lived":1,"version":"2.03","perl_release":"5.019004"},{"version":"2.04","dual_lived":1,"perl_release":"5.01901","date":"2014-03-20T00:00:00"},{"date":"2015-04-20T00:00:00","version":"2.11","dual_lived":1,"perl_release":"5.021011"},{"version":"2.11_01","dual_lived":1,"perl_release":"5.022003","date":"2017-01-14T00:00:00"},{"date":"2016-08-20T00:00:00","dual_lived":1,"version":"2.14_01","perl_release":"5.025004"},{"dual_lived":1,"version":"2.17","perl_release":"5.025010","date":"2017-02-20T00:00:00"},{"date":"2017-04-20T00:00:00","perl_release":"5.025012","version":"2.18","dual_lived":1},{"date":"2017-12-20T00:00:00","perl_release":"5.027007","dual_lived":1,"version":"2.20"},{"date":"2018-10-20T00:00:00","perl_release":"5.029004","version":"2.21","dual_lived":1}],"advisories":[{"references":["https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0","https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/","https://github.com/andk/cpanpm/pull/175","https://www.openwall.com/lists/oss-security/2023/04/18/14"],"affected_versions":["<2.35"],"description":"The verify_SSL flag is missing from HTTP::Tiny, and allows a network attacker to MITM the connection if it is used by the CPAN client\n","distribution":"CPAN","reported":"2023-02-28","fixed_versions":[">=2.35"],"cves":["CVE-2023-31484"],"previous_id":["CPANSA-CPAN-2023-01"],"id":"CPANSA-CPAN-2023-31484"},{"affected_versions":["<1.93"],"references":["https://github.com/andk/cpanpm/commit/079fa2e7ee77d626eab8bb06d0465c6a05f6c8b6","https://rt.cpan.org/Ticket/Display.html?id=46384"],"reported":"2009-09-23","cves":[],"fixed_versions":[">=1.93"],"distribution":"CPAN","description":"Archive::Tar preserves permissions in the tarball; extracted file permissions will be set from users umask instead.\n","id":"CPANSA-CPAN-2009-01"},{"severity":"high","references":["https://metacpan.org/pod/distribution/CPAN/scripts/cpan","https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/","http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/"],"affected_versions":["<2.28"],"id":"CPANSA-CPAN-2020-16156","reported":"2021-12-13","cves":["CVE-2020-16156"],"fixed_versions":[">=2.29"],"distribution":"CPAN","description":"CPAN 2.28 allows Signature Verification Bypass."}]},"PAR-Packer":{"versions":[{"version":"0.969_01","date":"2006-12-01T14:20:06"},{"date":"2006-12-03T17:36:32","version":"0.970"},{"date":"2007-02-03T12:27:07","version":"0.973"},{"date":"2007-05-07T18:21:52","version":"0.975"},{"version":"0.976","date":"2007-07-29T11:50:15"},{"version":"0.977","date":"2007-12-20T21:39:30"},{"version":"0.978","date":"2008-02-29T18:37:56"},{"version":"0.979","date":"2008-05-13T15:45:56"},{"version":"0.980","date":"2008-05-14T10:27:09"},{"version":"0.982","date":"2008-07-29T15:44:11"},{"date":"2009-03-10T15:55:06","version":"0.980"},{"version":"0.991","date":"2009-03-21T11:20:02"},{"version":"0.992_01","date":"2009-07-19T16:47:51"},{"date":"2009-07-23T13:18:32","version":"0.992_02"},{"date":"2009-07-24T18:30:24","version":"0.992_03"},{"date":"2009-09-11T07:38:47","version":"0.992_04"},{"version":"0.992_05","date":"2009-11-13T09:01:15"},{"version":"0.992_06","date":"2009-11-20T13:59:38"},{"version":"1.000","date":"2009-11-22T13:08:12"},{"date":"2009-11-24T11:16:58","version":"1.001"},{"version":"1.002","date":"2009-12-17T20:55:25"},{"version":"1.003","date":"2010-04-10T17:57:57"},{"version":"1.004","date":"2010-04-20T12:10:24"},{"version":"1.005","date":"2010-06-05T15:54:54"},{"version":"1.006","date":"2010-06-26T11:23:34"},{"date":"2010-09-09T16:42:00","version":"1.007"},{"date":"2010-11-21T17:11:43","version":"1.008"},{"date":"2011-03-26T13:36:55","version":"1.009"},{"version":"1.010","date":"2011-07-13T14:10:05"},{"date":"2011-12-01T21:08:37","version":"1.011"},{"date":"2011-12-02T17:53:42","version":"1.012"},{"date":"2012-02-22T09:58:04","version":"1.013"},{"version":"1.014","date":"2012-12-21T15:55:13"},{"date":"2013-10-09T12:06:04","version":"1.015"},{"version":"1.016","date":"2013-11-30T19:03:48"},{"version":"1.017","date":"2013-12-03T23:53:51"},{"version":"1.018","date":"2014-05-18T16:52:34"},{"date":"2014-07-07T14:25:15","version":"1.019"},{"date":"2014-08-24T13:27:57","version":"1.020"},{"version":"1.021","date":"2014-09-14T13:49:37"},{"version":"1.022","date":"2014-09-19T10:07:30"},{"version":"1.023","date":"2014-11-02T14:32:42"},{"date":"2014-11-07T09:04:07","version":"1.024"},{"version":"1.025","date":"2015-01-24T16:52:17"},{"date":"2015-07-19T13:14:40","version":"1.026"},{"version":"1.027","date":"2015-11-18T16:58:33"},{"version":"1.027","date":"2015-11-19T09:05:09"},{"version":"1.029","date":"2016-01-12T16:24:46"},{"version":"1.029_01","date":"2016-02-02T14:54:21"},{"version":"1.029_02","date":"2016-02-11T14:08:57"},{"version":"1.029_03","date":"2016-02-25T08:41:55"},{"date":"2016-02-29T08:36:46","version":"1.029_04"},{"version":"1.030","date":"2016-03-29T08:29:59"},{"version":"1.031","date":"2016-04-10T17:15:52"},{"version":"1.031_01","date":"2016-04-29T17:01:57"},{"date":"2016-05-07T09:59:28","version":"1.032"},{"date":"2016-05-19T09:50:49","version":"1.033"},{"version":"1.034","date":"2016-07-17T12:38:31"},{"date":"2016-07-23T12:04:14","version":"1.035"},{"date":"2016-12-04T17:13:20","version":"1.035_001"},{"date":"2016-12-19T19:35:16","version":"1.035_002"},{"version":"1.036","date":"2016-12-30T11:06:25"},{"date":"2017-03-22T19:29:19","version":"1.036_001"},{"version":"1.036_002","date":"2017-05-14T11:54:43"},{"version":"1.037","date":"2017-05-28T11:33:53"},{"date":"2017-09-27T19:40:44","version":"1.038"},{"version":"1.039","date":"2017-09-28T05:13:05"},{"version":"1.039_001","date":"2017-10-10T17:00:14"},{"version":"1.039_002","date":"2017-10-13T12:05:52"},{"version":"1.039_003","date":"2017-10-16T20:46:49"},{"version":"1.039_004","date":"2017-10-17T17:07:49"},{"date":"2017-10-21T16:09:18","version":"1.040"},{"version":"1.041","date":"2017-11-08T17:07:11"},{"date":"2018-04-02T21:46:01","version":"1.042"},{"date":"2018-04-03T11:26:08","version":"1.043"},{"version":"1.044","date":"2018-06-06T22:03:32"},{"date":"2018-06-12T19:04:22","version":"1.045"},{"version":"1.046","date":"2018-08-17T22:20:28"},{"version":"1.047","date":"2018-08-19T09:17:57"},{"version":"1.047_001","date":"2019-03-04T09:42:35"},{"date":"2019-03-04T15:33:14","version":"1.047_002"},{"version":"1.047_003","date":"2019-03-06T17:39:18"},{"date":"2019-04-29T11:53:04","version":"1.048"},{"date":"2019-05-31T11:58:05","version":"1.049"},{"version":"1.049_001","date":"2020-03-08T15:56:09"},{"version":"1.049_002","date":"2020-03-08T22:53:16"},{"version":"1.049_003","date":"2020-03-08T22:58:32"},{"date":"2020-03-10T13:51:31","version":"1.049_004"},{"date":"2020-03-18T08:14:29","version":"1.050"},{"version":"1.051","date":"2020-11-29T22:25:00"},{"version":"1.052","date":"2021-01-13T15:44:24"},{"date":"2022-01-25T15:25:10","version":"1.053"},{"date":"2022-01-27T11:05:32","version":"1.054"},{"date":"2022-07-03T16:27:19","version":"1.055"},{"version":"1.055_01","date":"2022-08-31T07:56:09"},{"date":"2022-09-05T10:12:07","version":"1.056"},{"version":"1.056_01","date":"2022-11-25T09:12:00"},{"date":"2022-11-27T15:25:29","version":"1.056_02"},{"date":"2022-11-29T11:33:29","version":"1.057"},{"version":"1.057_001","date":"2023-05-24T11:53:27"},{"version":"1.057_002","date":"2023-06-07T14:56:47"},{"version":"1.058","date":"2023-06-12T09:14:24"},{"date":"2023-07-20T14:13:30","version":"1.059"},{"version":"1.061","date":"2023-12-15T14:05:16"},{"version":"1.062","date":"2024-03-05T14:01:26"},{"version":"1.062_001","date":"2024-03-10T13:46:23"},{"version":"1.062_002","date":"2024-03-11T13:08:45"},{"version":"1.063","date":"2024-03-15T12:57:23"},{"version":"1.063_001","date":"2024-06-24T09:05:18"}],"main_module":"PAR::Packer","advisories":[{"distribution":"PAR-Packer","description":"PAR packed files are extracted to unsafe and predictable temporary directories.\n","reported":"2011-07-18","fixed_versions":[">=1.011"],"cves":["CVE-2011-4114"],"id":"CPANSA-PAR-Packer-2011-01","references":["https://metacpan.org/changes/distribution/PAR-Packer","https://rt.cpan.org/Public/Bug/Display.html?id=69560"],"affected_versions":["<1.011"]}]},"Jifty":{"versions":[{"date":"2005-12-25T08:19:39","version":"0.51225"},{"date":"2005-12-28T17:23:39","version":"0.51228"},{"version":"0.60213","date":"2006-02-14T04:15:03"},{"version":"0.60213","date":"2006-02-22T04:57:24"},{"version":"0.60213","date":"2006-03-21T23:10:58"},{"version":"0.60321","date":"2006-05-05T18:56:21"},{"version":"0.60507","date":"2006-05-08T14:38:03"},{"date":"2006-06-15T14:01:15","version":"0.60714"},{"date":"2006-06-16T12:16:03","version":"0.60616"},{"version":"0.60706","date":"2006-07-07T04:32:27"},{"date":"2006-07-07T05:54:06","version":"0.60707"},{"date":"2006-07-23T00:27:10","version":"0.60722"},{"date":"2006-09-13T00:25:58","version":"0.60912"},{"date":"2006-11-24T03:39:06","version":"0.61123_01"},{"version":"0.70116","date":"2007-01-17T04:52:58"},{"version":"0.70117","date":"2007-01-17T20:49:04"},{"date":"2007-04-17T18:45:55","version":"0.70415"},{"date":"2007-04-23T01:08:41","version":"0.70422"},{"version":"0.70824","date":"2007-08-24T04:20:59"},{"version":"0.71129","date":"2007-11-29T22:13:17"},{"version":"0.80408","date":"2008-04-08T21:15:29"},{"date":"2009-04-09T23:10:34","version":"0.90409"},{"date":"2009-05-20T01:14:48","version":"0.90519"},{"version":"0.90519","date":"2009-06-30T17:41:18"},{"version":"0.90519","date":"2009-07-01T19:08:14"},{"date":"2009-11-18T00:08:35","version":"0.90701"},{"date":"2010-12-09T23:08:09","version":"1.01209"},{"date":"2011-02-14T22:10:50","version":"1.10214"},{"version":"1.10228","date":"2011-02-28T16:22:26"},{"version":"1.10518","date":"2011-05-18T18:12:42"},{"version":"1.50430","date":"2015-04-30T20:48:27"}],"main_module":"Jifty","advisories":[{"distribution":"Jifty","description":"The path as passed in the fragment request data structure was used verbatim in the dispatcher and other locations. This possibly allowed requests to walk around ACLs by requesting '/some/safe/place/../../../dangerous' as a fragment.\n","cves":[],"reported":"2011-03-17","fixed_versions":[">=1.10518"],"id":"CPANSA-Jifty-2011-01","references":["https://metacpan.org/dist/Jifty/changes"],"affected_versions":["<1.10518"]},{"id":"CPANSA-Jifty-2009-01","reported":"2009-04-09","fixed_versions":[">=0.90409"],"cves":[],"distribution":"Jifty","description":"The REST plugin would let you call any method on the model.\n","affected_versions":["<0.90409"],"references":["https://metacpan.org/dist/Jifty/changes"]},{"reported":"2009-04-08","cves":[],"fixed_versions":[">=0.80408"],"distribution":"Jifty","description":"Allowed all actions on GET.\n","id":"CPANSA-Jifty-2008-01","affected_versions":["<0.70408"],"references":["https://metacpan.org/dist/Jifty/changes"]},{"references":["https://metacpan.org/dist/Jifty/changes"],"affected_versions":["<0.60706"],"id":"CPANSA-Jifty-2006-01","cves":[],"reported":"2006-07-06","fixed_versions":[">=0.60706"],"distribution":"Jifty","description":"Jifty did not protect users against a class of remote data access vulnerability. If an attacker knew the structure of your local filesystem and you were using the \"standalone\" webserver in production, the attacker could gain read only access to local files.\n"}]},"Encode":{"advisories":[{"description":"Loading optional modules from . (current directory).\n","distribution":"Encode","cves":["CVE-2016-1238"],"reported":"2016-07-27","fixed_versions":[">=2.85"],"id":"CPANSA-Encode-2016-01","references":["https://metacpan.org/changes/distribution/Encode","https://github.com/dankogai/p5-encode/pull/58/commits/12be15d64ce089154c4367dc1842cd0dc0993ec6"],"affected_versions":["<2.85"],"severity":"high"},{"references":["https://github.com/Perl/perl5/commit/c1a937fef07c061600a0078f4cb53fe9c2136bb9","https://github.com/dankogai/p5-encode/commit/527e482dc70b035d0df4f8c77a00d81f8d775c74","https://metacpan.org/dist/Encode/changes","https://news.cpanel.com/unscheduled-tsr-10-august-2021/","https://security.netapp.com/advisory/ntap-20210909-0003/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5NDGQSGMEZ75FJGBKNYC75OTO7TF7XHB/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6KOZYD7BH2DNIAEZ2ZL4PJ4QUVQI6Y33/","https://security-tracker.debian.org/tracker/CVE-2021-36770"],"affected_versions":[">=3.05","<=3.11"],"id":"CPANSA-Encode-2021-01","reported":"2021-07-17","fixed_versions":[">3.11"],"cves":["CVE-2021-36770"],"description":"Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.\n","distribution":"Encode"},{"affected_versions":["<2.44"],"references":["http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5","https://bugzilla.redhat.com/show_bug.cgi?id=731246","http://www.openwall.com/lists/oss-security/2011/08/19/17","http://www.redhat.com/support/errata/RHSA-2011-1424.html","http://www.openwall.com/lists/oss-security/2011/08/18/8","http://secunia.com/advisories/46989","http://www.mandriva.com/security/advisories?name=MDVSA-2012:008","http://secunia.com/advisories/51457","http://www.ubuntu.com/usn/USN-1643-1","http://www.securityfocus.com/bid/49858","http://secunia.com/advisories/46172","http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod","http://secunia.com/advisories/55314","http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_(CVE-2011-2939)"],"reported":"2012-01-13","cves":["CVE-2011-2939"],"fixed_versions":[">=2.44"],"description":"Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow.\n","distribution":"Encode","id":"CPANSA-Encode-2011-2939","severity":null,"x-commit":"Encode CVE-2011-2939 GitHub #13"}],"versions":[{"version":"0.93","date":"2002-03-20T08:30:40"},{"version":"0.94","date":"2002-03-20T20:15:52"},{"version":"0.95","date":"2002-03-21T16:07:21"},{"version":"0.96","date":"2002-03-22T22:33:15"},{"version":"0.97","date":"2002-03-23T20:36:05"},{"version":"0.98","date":"2002-03-24T16:07:09"},{"date":"2002-03-25T19:45:16","version":"0.99"},{"version":"1.00","date":"2002-03-28T23:39:49"},{"date":"2002-03-29T21:43:17","version":"1.01"},{"version":"1.10","date":"2002-03-31T21:40:25"},{"version":"1.11","date":"2002-03-31T22:27:07"},{"version":"1.20","date":"2002-04-04T20:02:40"},{"version":"1.26","date":"2002-04-07T15:36:48"},{"version":"1.27","date":"2002-04-07T18:49:41"},{"version":"1.28","date":"2002-04-07T19:05:34"},{"version":"1.30","date":"2002-04-08T02:49:31"},{"version":"1.31","date":"2002-04-08T18:51:14"},{"version":"1.32","date":"2002-04-09T20:26:37"},{"version":"1.33","date":"2002-04-10T22:44:19"},{"date":"2002-04-14T22:49:10","version":"1.40"},{"date":"2002-04-16T23:47:16","version":"1.41"},{"date":"2002-04-19T06:18:26","version":"1.50"},{"date":"2002-04-20T10:08:39","version":"1.51"},{"date":"2002-04-20T23:55:45","version":"1.52"},{"date":"2002-04-22T09:56:04","version":"1.56"},{"version":"1.57","date":"2002-04-22T20:37:12"},{"date":"2002-04-23T00:22:06","version":"1.58"},{"date":"2002-04-24T20:23:42","version":"1.60"},{"version":"1.61","date":"2002-04-26T03:19:40"},{"version":"1.62","date":"2002-04-27T11:43:39"},{"date":"2002-04-27T19:52:51","version":"1.63"},{"version":"1.64","date":"2002-04-29T07:20:38"},{"date":"2002-04-30T16:40:07","version":"1.65"},{"version":"1.66","date":"2002-05-01T05:51:35"},{"date":"2002-05-02T07:43:35","version":"1.67"},{"date":"2002-05-03T12:29:47","version":"1.68"},{"version":"1.69","date":"2002-05-04T16:50:40"},{"date":"2002-05-06T10:36:39","version":"1.70"},{"version":"1.71","date":"2002-05-07T16:30:42"},{"date":"2002-05-20T16:04:48","version":"1.72"},{"version":"1.74","date":"2002-05-28T18:41:36"},{"version":"1.75","date":"2002-06-01T18:17:49"},{"version":"1.76","date":"2002-08-25T15:18:49"},{"version":"1.77","date":"2002-10-06T03:59:19"},{"version":"1.78","date":"2002-10-20T15:55:16"},{"date":"2002-10-21T06:11:36","version":"1.79"},{"date":"2002-10-21T20:42:56","version":"1.80"},{"date":"2002-11-08T18:42:11","version":"1.81"},{"version":"1.82","date":"2002-11-14T23:17:11"},{"version":"1.83","date":"2002-11-18T18:06:47"},{"version":"1.84","date":"2003-01-10T12:09:05"},{"version":"1.85","date":"2003-01-21T22:23:28"},{"date":"2003-01-22T03:36:42","version":"1.86"},{"date":"2003-02-06T02:01:00","version":"1.87"},{"date":"2003-02-20T14:46:12","version":"1.88"},{"date":"2003-02-28T01:45:53","version":"1.89"},{"date":"2003-03-09T17:54:26","version":"1.90"},{"version":"1.91","date":"2003-03-09T20:12:08"},{"date":"2003-03-31T03:51:31","version":"1.92"},{"version":"1.93","date":"2003-04-24T17:50:54"},{"date":"2003-05-10T18:31:48","version":"1.94"},{"date":"2003-05-21T09:22:43","version":"1.95"},{"date":"2003-06-18T09:41:21","version":"1.96"},{"version":"1.97","date":"2003-07-08T22:01:28"},{"date":"2003-08-25T11:47:32","version":"1.98"},{"version":"1.99","date":"2003-12-29T02:52:28"},{"version":"2.00","date":"2004-05-16T21:05:06"},{"date":"2004-05-25T16:31:35","version":"2.01"},{"date":"2004-08-31T11:01:51","version":"2.02"},{"version":"2.03","date":"2004-10-06T06:50:47"},{"version":"2.04","date":"2004-10-16T21:26:58"},{"version":"2.05","date":"2004-10-19T05:03:32"},{"version":"2.06","date":"2004-10-22T06:29:14"},{"date":"2004-10-22T19:43:19","version":"2.07"},{"version":"2.08","date":"2004-10-24T13:04:29"},{"version":"2.09","date":"2004-12-03T19:21:42"},{"date":"2005-05-16T18:54:53","version":"2.10"},{"version":"2.11","date":"2005-08-05T11:26:06"},{"date":"2005-09-08T14:23:38","version":"2.12"},{"version":"2.13","date":"2006-01-15T15:12:01"},{"version":"2.14","date":"2006-01-15T15:57:41"},{"date":"2006-04-06T16:01:30","version":"2.15"},{"date":"2006-05-03T18:38:44","version":"2.16"},{"version":"2.17","date":"2006-05-09T17:14:04"},{"version":"2.18","date":"2006-06-03T20:34:08"},{"date":"2007-04-06T13:05:52","version":"2.19"},{"version":"2.20","date":"2007-04-22T15:17:34"},{"date":"2007-05-12T06:50:09","version":"2.21"},{"date":"2007-05-29T07:43:07","version":"2.22"},{"date":"2007-05-29T18:21:25","version":"2.23"},{"version":"2.24","date":"2008-03-12T10:12:18"},{"date":"2008-05-07T21:06:08","version":"2.25"},{"date":"2008-07-01T21:03:33","version":"2.26"},{"date":"2009-01-21T23:01:50","version":"2.27"},{"version":"2.29","date":"2009-02-01T13:16:44"},{"date":"2009-02-15T17:48:01","version":"2.30"},{"date":"2009-02-16T06:25:32","version":"2.31"},{"date":"2009-03-07T07:45:00","version":"2.32"},{"date":"2009-03-25T08:01:10","version":"2.33"},{"version":"2.34","date":"2009-07-08T13:53:25"},{"date":"2009-07-13T02:32:45","version":"2.35"},{"date":"2009-09-06T09:20:21","version":"2.36"},{"date":"2009-09-06T14:37:23","version":"2.37"},{"date":"2009-11-16T14:34:43","version":"2.38"},{"date":"2009-11-26T09:31:02","version":"2.39"},{"version":"2.40","date":"2010-09-18T18:47:17"},{"date":"2010-12-23T11:12:33","version":"2.41"},{"date":"2010-12-31T22:52:35","version":"2.42"},{"date":"2011-05-21T23:21:24","version":"2.43"},{"date":"2011-08-09T08:01:30","version":"2.44"},{"date":"2012-08-05T23:15:11","version":"2.45"},{"version":"2.46","date":"2012-08-12T05:52:45"},{"version":"2.47","date":"2012-08-15T05:40:21"},{"version":"2.48","date":"2013-02-18T02:43:35"},{"date":"2013-03-05T03:19:15","version":"2.49"},{"date":"2013-04-26T18:36:59","version":"2.50"},{"date":"2013-04-29T22:21:31","version":"2.51"},{"version":"2.52","date":"2013-08-14T02:33:46"},{"version":"2.53","date":"2013-08-29T15:27:02"},{"version":"2.54","date":"2013-08-29T16:50:08"},{"date":"2013-09-14T07:58:54","version":"2.55"},{"version":"2.56","date":"2013-12-22T04:12:07"},{"date":"2014-01-03T04:55:36","version":"2.57"},{"date":"2014-03-28T02:41:54","version":"2.58"},{"date":"2014-04-06T17:41:19","version":"2.59"},{"date":"2014-04-29T16:34:10","version":"2.60"},{"version":"2.61","date":"2014-05-31T09:55:56"},{"date":"2014-05-31T12:20:28","version":"2.62"},{"version":"2.63","date":"2014-10-19T07:13:44"},{"version":"2.64","date":"2014-10-29T15:42:04"},{"date":"2014-11-27T14:12:57","version":"2.65"},{"date":"2014-12-02T23:37:28","version":"2.66"},{"version":"2.67","date":"2014-12-04T20:28:33"},{"date":"2015-01-22T10:29:46","version":"2.68"},{"date":"2015-02-05T10:43:34","version":"2.69"},{"date":"2015-02-05T10:56:52","version":"2.70"},{"date":"2015-03-12T00:14:19","version":"2.71"},{"date":"2015-03-14T02:51:25","version":"2.72"},{"date":"2015-04-15T23:27:13","version":"2.73"},{"date":"2015-06-25T00:59:20","version":"2.74"},{"date":"2015-06-30T10:10:03","version":"2.75"},{"date":"2015-07-31T02:26:51","version":"2.76"},{"date":"2015-09-15T14:03:35","version":"2.77"},{"version":"2.78","date":"2015-09-24T02:29:52"},{"date":"2016-01-22T07:08:25","version":"2.79"},{"version":"2.80","date":"2016-01-25T15:04:42"},{"version":"2.81","date":"2016-02-06T19:34:58"},{"date":"2016-02-06T20:21:37","version":"2.82"},{"date":"2016-03-24T08:00:30","version":"2.83"},{"version":"2.84","date":"2016-04-11T07:24:26"},{"date":"2016-08-04T03:37:23","version":"2.85"},{"date":"2016-08-10T18:25:39","version":"2.86"},{"date":"2016-10-28T05:15:33","version":"2.87"},{"date":"2016-11-29T23:38:19","version":"2.88"},{"date":"2017-04-21T05:24:59","version":"2.89"},{"date":"2017-06-10T17:46:11","version":"2.90"},{"date":"2017-06-22T08:18:22","version":"2.91"},{"date":"2017-07-18T07:23:39","version":"2.92"},{"version":"2.93","date":"2017-10-06T22:33:35"},{"version":"2.94","date":"2018-01-09T06:04:38"},{"date":"2018-02-08T00:41:02","version":"2.95"},{"version":"2.96","date":"2018-02-11T05:41:37"},{"version":"2.97","date":"2018-02-21T12:30:05"},{"date":"2018-04-22T09:14:59","version":"2.98"},{"version":"2.99","date":"2019-01-21T03:28:35"},{"version":"2.100","date":"2019-01-31T04:42:29"},{"date":"2019-01-31T05:05:06","version":"3.00"},{"date":"2019-03-13T00:45:28","version":"3.01"},{"version":"3.02","date":"2019-12-25T09:47:36"},{"date":"2020-03-02T04:45:26","version":"3.03"},{"date":"2020-03-10T22:40:35","version":"3.04"},{"version":"3.05","date":"2020-03-18T05:03:23"},{"version":"3.06","date":"2020-05-02T02:40:38"},{"date":"2020-07-25T13:08:13","version":"3.07"},{"date":"2020-12-02T09:20:23","version":"3.08"},{"version":"3.09","date":"2021-05-14T11:03:11"},{"version":"3.10","date":"2021-05-18T07:51:48"},{"version":"3.11","date":"2021-07-23T02:41:38"},{"version":"3.12","date":"2021-08-09T14:30:33"},{"date":"2021-10-06T00:57:50","version":"3.13"},{"version":"3.14","date":"2021-10-08T00:35:29"},{"version":"3.15","date":"2021-10-08T15:45:44"},{"date":"2021-10-13T08:39:09","version":"3.16"},{"date":"2022-04-07T03:18:23","version":"3.17"},{"date":"2022-06-25T02:14:35","version":"3.18"},{"date":"2022-08-04T04:51:01","version":"3.19"},{"version":"3.20","date":"2023-11-10T01:26:15"},{"version":"3.21","date":"2024-02-25T23:19:43"},{"dual_lived":1,"version":"0.40","perl_release":"5.007003","date":"2002-03-05T00:00:00"},{"date":"2003-09-25T00:00:00","perl_release":"5.008001","dual_lived":1,"version":"1.9801"},{"date":"2004-04-21T00:00:00","perl_release":"5.008004","dual_lived":1,"version":"1.99_01"},{"dual_lived":1,"version":"2.18_01","perl_release":"5.009004","date":"2006-08-15T00:00:00"},{"dual_lived":1,"version":"2.39_01","perl_release":"5.012005","date":"2012-11-10T00:00:00"},{"date":"2011-09-26T00:00:00","dual_lived":1,"version":"2.42_01","perl_release":"5.014002"},{"date":"2013-03-10T00:00:00","version":"2.42_02","dual_lived":1,"perl_release":"5.014004"},{"date":"2013-03-11T00:00:00","dual_lived":1,"version":"2.44_01","perl_release":"5.016003"},{"date":"2017-01-14T00:00:00","version":"2.72_01","dual_lived":1,"perl_release":"5.022003"},{"date":"2017-01-14T00:00:00","dual_lived":1,"version":"2.80_01","perl_release":"5.024001"},{"perl_release":"5.034001","dual_lived":1,"version":"3.08_01","date":"2022-03-13T00:00:00"}],"main_module":"Encode"},"Net-CIDR-Lite":{"advisories":[{"id":"CPANSA-Net-CIDR-Lite-2021-47154","fixed_versions":[">=0.22"],"reported":"2024-03-18","cves":["CVE-2021-47154"],"distribution":"Net-CIDR-Lite","description":"The Net::CIDR::Lite module before 0.22 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.\n","severity":null,"affected_versions":["<0.22"],"references":["https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/","https://github.com/stigtsp/Net-CIDR-Lite/commit/23b6ff0590dc279521863a502e890ef19a5a76fc","https://metacpan.org/dist/Net-CIDR-Lite/changes","https://metacpan.org/pod/Net::CIDR::Lite"]}],"versions":[{"date":"2001-10-23T22:54:21","version":"0.02"},{"version":"0.03","date":"2001-10-24T00:14:02"},{"version":"0.04","date":"2001-10-24T00:55:11"},{"version":"0.05","date":"2001-10-25T17:20:05"},{"date":"2001-10-31T01:40:19","version":"0.06"},{"version":"0.07","date":"2001-10-31T23:51:49"},{"date":"2001-11-26T23:12:47","version":"0.08"},{"version":"0.09","date":"2001-11-27T05:47:30"},{"date":"2001-11-27T18:25:47","version":"0.10"},{"version":"0.11","date":"2002-04-16T05:44:00"},{"date":"2002-07-15T07:07:02","version":"0.12"},{"date":"2002-07-15T09:46:34","version":"0.13"},{"date":"2002-07-15T16:31:01","version":"0.14"},{"version":"0.15","date":"2003-04-16T20:20:04"},{"date":"2005-05-18T19:01:44","version":"0.16"},{"date":"2005-05-18T19:43:12","version":"0.17"},{"version":"0.18","date":"2005-05-21T08:14:32"},{"version":"0.19","date":"2006-01-30T19:34:31"},{"date":"2006-02-14T00:58:01","version":"0.20"},{"date":"2010-03-26T00:38:30","version":"0.21"},{"date":"2021-04-04T21:03:12","version":"0.22"}],"main_module":"Net::CIDR::Lite"},"Apache-Session-Browseable":{"main_module":"Apache::Session::Browseable","versions":[{"date":"2009-10-31T08:09:42","version":"0.1"},{"version":"0.2","date":"2009-11-01T09:10:13"},{"date":"2009-11-01T16:21:16","version":"0.3"},{"version":"0.4","date":"2010-08-16T15:26:19"},{"date":"2010-12-06T21:08:25","version":"0.5"},{"date":"2010-12-08T15:45:21","version":"0.6"},{"date":"2012-06-24T07:14:37","version":"0.7"},{"version":"0.8","date":"2012-10-13T16:15:41"},{"version":"0.9","date":"2013-02-28T06:05:09"},{"version":"1.0","date":"2013-08-28T04:42:23"},{"date":"2013-08-30T04:47:02","version":"1.0"},{"date":"2013-10-20T05:39:14","version":"v1.0.2"},{"version":"1.1","date":"2015-06-12T15:56:45"},{"date":"2016-03-09T05:31:13","version":"1.2"},{"version":"v1.2.1","date":"2016-03-10T06:30:41"},{"date":"2016-04-01T11:34:51","version":"v1.2.2"},{"date":"2016-06-07T13:59:19","version":"v1.2.3"},{"version":"v1.2.4","date":"2017-02-19T07:34:18"},{"date":"2017-04-04T05:18:26","version":"v1.2.5"},{"date":"2017-09-12T09:35:30","version":"v1.2.5"},{"version":"v1.2.7","date":"2017-10-03T05:00:07"},{"date":"2017-10-03T10:42:35","version":"v1.2.8"},{"date":"2019-02-08T06:29:20","version":"v1.2.9"},{"date":"2019-02-08T09:31:22","version":"v1.3.0"},{"version":"v1.3.1","date":"2019-05-04T10:55:48"},{"version":"v1.3.2","date":"2019-07-04T18:30:30"},{"version":"v1.3.3","date":"2019-09-19T20:44:43"},{"version":"v1.3.4","date":"2019-11-20T19:43:04"},{"date":"2020-01-21T10:20:26","version":"v1.3.5"},{"date":"2020-09-04T13:23:31","version":"v1.3.6"},{"version":"v1.3.7","date":"2020-09-04T13:39:40"},{"date":"2020-09-06T21:03:06","version":"v1.3.8"},{"date":"2021-08-10T04:44:06","version":"v1.3.9"},{"date":"2022-03-08T13:51:31","version":"v1.3.10"},{"version":"v1.3.11","date":"2022-09-26T16:41:24"},{"version":"v1.3.12","date":"2023-07-06T10:43:25"},{"date":"2023-07-06T11:38:32","version":"v1.3.13"},{"version":"v1.3.13","date":"2024-12-19T07:59:19"},{"date":"2025-04-10T19:24:48","version":"v1.3.15"},{"version":"v1.3.16","date":"2025-04-12T10:31:56"}],"advisories":[{"distribution":"Apache-Session-Browseable","description":"In Apache::Session::Browseable before 1.3.6, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.\n","reported":"2023-01-27","cves":["CVE-2020-36659"],"fixed_versions":[">=1.3.6"],"id":"CPANSA-Apache-Session-Browseable-2020-36659","references":["https://github.com/LemonLDAPNG/Apache-Session-Browseable/commit/fdf393235140b293cae5578ef136055a78f3574f","https://lists.debian.org/debian-lts-announce/2023/01/msg00025.html"],"affected_versions":["<1.3.6"],"severity":null}]},"Lemonldap-NG-Portal":{"versions":[{"version":"0.01","date":"2005-06-29T18:44:50"},{"version":"0.02","date":"2005-07-02T08:49:37"},{"date":"2006-10-07T13:24:36","version":"0.1"},{"date":"2006-10-14T13:26:07","version":"0.11"},{"version":"0.111","date":"2006-10-14T14:11:06"},{"date":"2006-10-17T13:58:53","version":"0.2"},{"date":"2006-11-02T15:23:31","version":"0.4"},{"date":"2006-11-03T07:25:06","version":"0.41"},{"version":"0.42","date":"2006-12-07T21:02:36"},{"version":"0.5","date":"2006-12-19T18:26:07"},{"version":"0.51","date":"2006-12-31T13:03:32"},{"version":"0.6","date":"2007-01-13T19:47:36"},{"version":"0.62","date":"2007-02-28T22:29:18"},{"date":"2007-03-04T18:23:52","version":"0.63"},{"date":"2007-03-09T20:18:23","version":"0.64"},{"date":"2007-03-29T19:52:31","version":"0.7"},{"date":"2007-04-01T20:26:10","version":"0.71"},{"date":"2007-04-14T20:46:13","version":"0.72"},{"version":"0.73","date":"2007-04-20T06:51:13"},{"version":"0.74","date":"2007-06-13T13:54:26"},{"date":"2007-07-22T20:35:13","version":"0.76"},{"version":"0.77","date":"2007-07-31T05:11:34"},{"version":"0.8","date":"2007-10-15T06:03:56"},{"version":"0.81","date":"2008-02-28T07:13:04"},{"version":"0.82","date":"2008-04-11T14:53:38"},{"version":"0.83","date":"2008-06-06T05:50:06"},{"date":"2008-06-06T12:46:10","version":"0.84"},{"date":"2008-08-25T19:53:48","version":"0.85"},{"date":"2008-12-25T08:26:49","version":"0.86"},{"date":"2009-02-08T07:13:05","version":"0.87"},{"version":"0.88","date":"2009-06-29T10:14:46"},{"date":"2009-07-05T11:40:59","version":"0.89"},{"version":"0.90","date":"2009-10-11T08:26:21"},{"date":"2010-10-13T21:02:21","version":"0.99"},{"date":"2010-10-22T05:36:29","version":"0.99.1"},{"version":"0.991","date":"2010-10-22T05:45:04"},{"version":"0.992","date":"2010-10-24T06:33:29"},{"version":"1.0.0","date":"2010-11-26T13:38:59"},{"date":"2011-02-28T13:42:23","version":"1.0.2"},{"date":"2011-03-07T11:17:03","version":"v1.0.3"},{"date":"2011-03-23T14:54:26","version":"1.0.4"},{"date":"2011-04-15T14:51:44","version":"1.0.5"},{"date":"2011-05-30T08:40:46","version":"1.0.6"},{"version":"1.1.0","date":"2011-07-08T09:33:35"},{"version":"1.1.1","date":"2011-07-29T13:43:35"},{"version":"1.1.2","date":"2011-10-07T12:58:06"},{"version":"1.2.0","date":"2012-06-18T10:13:31"},{"date":"2012-07-06T09:18:54","version":"1.2.1"},{"version":"1.2.2","date":"2012-09-17T14:04:26"},{"date":"2013-01-25T21:51:54","version":"1.2.2_01"},{"version":"1.2.3","date":"2013-02-08T17:11:38"},{"version":"1.2.4","date":"2013-04-23T13:19:57"},{"version":"1.2.5","date":"2013-08-26T10:39:11"},{"date":"2013-11-02T16:31:10","version":"v1.3.0"},{"version":"v1.3.0_01","date":"2013-11-10T18:00:31"},{"date":"2013-11-11T14:01:21","version":"v1.3.1"},{"date":"2014-02-05T09:31:50","version":"1.3.2"},{"version":"1.3.3","date":"2014-03-07T13:55:23"},{"version":"v1.4.0","date":"2014-06-30T12:54:16"},{"date":"2014-07-25T09:55:37","version":"v1.4.1"},{"date":"2014-11-05T15:15:30","version":"v1.4.2"},{"date":"2014-12-19T10:31:47","version":"v1.4.3"},{"version":"v1.4.4","date":"2015-04-15T10:05:31"},{"version":"v1.4.5","date":"2015-05-22T16:54:10"},{"version":"v1.4.6","date":"2015-10-09T09:21:04"},{"date":"2016-03-02T09:50:24","version":"v1.9.0"},{"version":"v1.4.7","date":"2016-03-22T14:25:24"},{"version":"v1.9.1","date":"2016-04-05T16:02:49"},{"version":"v1.4.8","date":"2016-04-27T15:23:10"},{"date":"2016-05-01T19:25:36","version":"v1.9.2"},{"date":"2016-06-03T14:14:52","version":"v1.4.9"},{"date":"2016-06-07T15:48:38","version":"v1.9.3"},{"date":"2016-06-14T18:36:34","version":"v1.9.4"},{"version":"v1.4.10","date":"2016-07-13T09:08:18"},{"date":"2016-07-13T12:58:54","version":"v1.9.5"},{"date":"2016-10-10T13:34:33","version":"v1.4.11"},{"date":"2016-10-16T12:23:25","version":"v1.9.6"},{"version":"v1.9.7","date":"2016-12-14T19:57:55"},{"version":"v1.9.99_2.0alpha1","date":"2017-02-28T21:11:18"},{"date":"2017-03-02T14:55:34","version":"v1.9.8"},{"date":"2017-03-07T05:48:09","version":"v1.9.99_02"},{"version":"v1.9.99_03","date":"2017-03-07T06:00:28"},{"date":"2017-03-15T05:34:48","version":"v1.9.991_01"},{"date":"2017-03-17T07:21:31","version":"v1.9.9"},{"date":"2017-05-19T18:48:42","version":"v1.9.10"},{"version":"v1.9.11","date":"2017-09-01T10:32:34"},{"date":"2017-09-12T08:40:27","version":"v1.9.12"},{"date":"2017-09-29T14:00:36","version":"v1.9.13"},{"version":"v1.9.14","date":"2017-11-24T19:59:18"},{"version":"v1.9.15","date":"2018-01-23T12:50:53"},{"date":"2018-03-16T10:34:13","version":"v1.9.16"},{"date":"2018-06-16T09:27:27","version":"v1.9.17"},{"date":"2018-10-05T09:40:26","version":"v1.9.18"},{"date":"2018-11-30T10:49:52","version":"v2.0.0"},{"date":"2019-02-12T17:13:39","version":"v2.0.2"},{"date":"2019-04-11T12:23:10","version":"v2.0.3"},{"version":"v2.0.4","date":"2019-05-13T13:07:36"},{"date":"2019-06-29T21:31:33","version":"v2.0.5"},{"date":"2019-09-24T13:01:00","version":"v2.0.6"},{"date":"2019-12-21T21:46:38","version":"v2.0.7"},{"date":"2020-05-05T16:14:25","version":"v2.0.8"},{"version":"v2.0.9","date":"2020-09-07T06:21:08"},{"date":"2021-01-17T17:24:36","version":"v2.0.10"},{"date":"2021-01-31T14:52:09","version":"v2.0.11"},{"date":"2021-07-22T17:38:26","version":"v2.0.12"},{"date":"2021-08-23T07:09:56","version":"v2.0.13"},{"version":"v2.0.14","date":"2022-02-22T18:13:11"},{"date":"2022-09-09T17:10:35","version":"v2.0.15"},{"date":"2022-09-16T08:36:23","version":"v2.0.15.1"},{"date":"2023-02-01T15:29:55","version":"v2.0.16"},{"date":"2023-05-12T17:38:52","version":"v2.16.2"},{"version":"v2.17.0","date":"2023-08-30T16:24:40"},{"date":"2023-12-20T21:12:20","version":"v2.18.0"},{"date":"2023-12-22T23:41:14","version":"v2.18.1"},{"date":"2024-02-06T17:49:13","version":"v2.18.2"},{"date":"2024-04-30T15:23:21","version":"v2.19.0"},{"version":"v2.19.1","date":"2024-07-15T14:48:13"},{"date":"2024-09-04T07:30:33","version":"v2.19.2"},{"version":"v2.20.0","date":"2024-10-08T15:53:50"},{"date":"2024-11-08T16:34:12","version":"v2.20.1"},{"version":"v2.20.2","date":"2025-01-21T17:01:40"},{"date":"2025-01-22T17:40:34","version":"v2.16.4"},{"date":"2025-04-07T15:09:34","version":"v2.21.0"}],"main_module":"Lemonldap::NG::Portal","advisories":[{"references":["https://metacpan.org/changes/distribution/Lemonldap-NG-Portal"],"affected_versions":["<0.87"],"id":"CPANSA-Lemonldap-NG-Portal-2009-01","description":"When running on Apache with thread support setMacros and setGroups were not launched with the good datas.\n","distribution":"Lemonldap-NG-Portal","reported":"2009-02-08","cves":[],"fixed_versions":[">=0.87"]}]},"Tk":{"advisories":[{"references":["https://metacpan.org/changes/distribution/Tk"],"affected_versions":["<804.029"],"description":"Buffer overflow in the LWZReadByte_ function in the GD extension in allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.\n","distribution":"Tk","reported":"2008-10-01","cves":["CVE-2006-4484"],"fixed_versions":[">=804.029"],"id":"CPANSA-Tk-2008-01"}],"versions":[{"version":0,"date":"1995-08-22T23:03:30"},{"version":0,"date":"1995-12-19T01:56:04"},{"date":"1996-08-29T00:19:01","version":0},{"date":"1996-09-07T01:08:44","version":"400.200"},{"date":"1997-01-08T23:27:30","version":"400.201"},{"date":"1997-01-25T12:33:02","version":"400.202"},{"date":"1997-05-04T20:05:58","version":"402.000"},{"date":"1997-06-14T19:17:26","version":"402.001"},{"version":"402.002","date":"1997-07-18T17:01:40"},{"date":"1997-10-04T15:32:53","version":"402.003"},{"date":"1998-01-25T17:07:27","version":"402.004"},{"date":"1998-02-07T21:22:00","version":"402.003"},{"date":"1998-02-22T19:34:11","version":"800.000"},{"date":"1998-03-02T00:12:00","version":"800.0_01"},{"version":"800.0_02","date":"1998-03-09T22:37:37"},{"date":"1998-03-17T13:43:00","version":"402.003"},{"version":"402.003","date":"1998-04-01T04:36:00"},{"version":"402.003","date":"1998-04-02T18:32:00"},{"date":"1998-04-05T08:37:23","version":"800.003"},{"version":"800.004","date":"1998-04-19T17:23:45"},{"version":"800.005","date":"1998-05-17T18:07:11"},{"version":"800.006","date":"1998-06-14T20:30:35"},{"version":"800.007","date":"1998-06-26T16:30:23"},{"date":"1998-07-17T16:47:42","version":"800.008"},{"date":"1998-08-08T19:31:23","version":"800.010"},{"version":"800.011","date":"1998-09-01T17:20:02"},{"version":"800.012","date":"1998-11-15T14:28:04"},{"date":"1999-03-16T22:13:10","version":"800.013"},{"date":"1999-04-05T20:15:39","version":"800.014"},{"version":"800.015","date":"1999-07-28T22:10:03"},{"version":"800.017","date":"2000-01-08T12:48:56"},{"date":"2000-01-08T12:58:16","version":"800.0_16"},{"date":"2000-01-22T19:44:55","version":"800.018"},{"version":"800.019","date":"2000-03-13T16:39:08"},{"date":"2000-03-27T17:01:22","version":"800.020"},{"version":"800.021","date":"2000-04-21T13:38:21"},{"version":"800.022","date":"2000-05-13T09:48:51"},{"version":"800.023","date":"2001-05-15T15:07:21"},{"version":"800.012","date":"2001-07-14T21:06:00"},{"date":"2002-03-05T16:38:25","version":"800.024"},{"date":"2002-03-17T20:30:42","version":"800.024"},{"date":"2002-10-13T17:20:55","version":"804.0_24"},{"version":"v804.024.","date":"2003-05-02T01:10:54"},{"date":"2003-09-08T08:13:16","version":"800.025"},{"version":"804.025","date":"2003-09-28T18:01:55"},{"version":"804.025","date":"2003-10-10T18:24:24"},{"date":"2003-10-20T20:44:44","version":"804.025"},{"version":"804.025","date":"2003-10-27T08:23:07"},{"date":"2003-11-02T22:28:10","version":"804.025"},{"version":"804.025","date":"2003-11-16T22:15:42"},{"date":"2003-12-02T21:26:56","version":"804.025"},{"date":"2003-12-08T08:01:15","version":"804.025_"},{"version":"804.025","date":"2003-12-11T08:03:20"},{"date":"2003-12-14T20:22:05","version":"804.025"},{"date":"2003-12-19T17:42:32","version":"804.025"},{"date":"2003-12-21T21:09:10","version":"804.025_"},{"version":"804.025","date":"2003-12-23T23:19:20"},{"date":"2004-01-12T21:59:01","version":"804.025"},{"version":"804.025_","date":"2004-02-28T17:33:01"},{"version":"804.025_","date":"2004-03-07T20:33:56"},{"version":"804.026","date":"2004-03-19T08:10:49"},{"date":"2004-04-11T19:04:25","version":"804.026"},{"date":"2007-02-11T08:49:16","version":"804.027_500"},{"date":"2007-09-21T22:57:57","version":"804.027_501"},{"date":"2007-12-04T21:03:29","version":"804.027_502"},{"version":"804.028","date":"2007-12-18T22:01:39"},{"date":"2008-10-01T21:48:52","version":"804.0285"},{"version":"804.028501","date":"2008-11-04T22:27:51"},{"version":"804.028502","date":"2010-01-30T17:54:07"},{"version":"804.028503","date":"2010-05-13T00:00:04"},{"version":"804.029","date":"2010-05-27T19:25:41"},{"version":"804.0295","date":"2011-06-13T17:53:20"},{"version":"804.029501","date":"2011-10-14T19:22:48"},{"date":"2011-10-17T21:12:41","version":"804.029502"},{"date":"2011-10-20T21:08:12","version":"804.03"},{"date":"2013-05-17T22:16:24","version":"804.030500"},{"version":"804.030501","date":"2013-05-18T05:01:41"},{"version":"804.030502","date":"2013-05-21T07:30:50"},{"date":"2013-05-25T12:57:05","version":"804.031"},{"version":"804.031500","date":"2013-11-17T11:24:41"},{"date":"2013-11-18T20:19:08","version":"804.031501"},{"version":"804.031502","date":"2013-12-01T15:07:28"},{"date":"2013-12-07T13:00:14","version":"804.031503"},{"version":"804.032","date":"2014-01-26T17:01:07"},{"version":"804.032500","date":"2014-11-06T21:01:44"},{"version":"804.032501","date":"2015-01-31T10:28:08"},{"date":"2015-02-21T15:54:08","version":"804.033"},{"date":"2017-08-20T09:29:42","version":"804.033500"},{"version":"804.034","date":"2017-08-26T15:26:56"},{"version":"804.034500","date":"2020-02-23T16:12:23"},{"version":"804.034501","date":"2020-03-19T21:02:47"},{"date":"2020-03-28T19:28:42","version":"804.035"},{"version":"804.035501","date":"2021-02-07T19:55:40"},{"version":"804.036","date":"2021-02-14T12:53:44"}],"main_module":"Tk"},"Config-Model":{"versions":[{"version":"0.505","date":"2006-04-21T12:27:44"},{"version":"0.506","date":"2006-05-19T13:32:14"},{"version":"0.507","date":"2006-06-15T12:10:38"},{"version":"0.601","date":"2006-07-20T12:28:36"},{"date":"2006-09-07T12:06:17","version":"0.602"},{"date":"2006-10-19T11:24:40","version":"0.603"},{"date":"2006-12-06T12:58:35","version":"0.604"},{"version":"0.605","date":"2007-01-08T13:16:42"},{"version":"0.606","date":"2007-01-11T12:42:09"},{"date":"2007-01-12T13:06:38","version":"0.607"},{"version":"0.608","date":"2007-02-23T13:00:34"},{"version":"0.609","date":"2007-05-14T11:41:18"},{"version":"0.610","date":"2007-06-06T12:28:06"},{"date":"2007-07-03T15:35:21","version":"0.611"},{"version":"0.612","date":"2007-07-27T11:38:57"},{"date":"2007-10-01T15:52:56","version":"0.613"},{"version":"0.614","date":"2007-10-23T16:10:29"},{"date":"2007-11-15T12:36:18","version":"0.615"},{"date":"2007-12-04T12:41:22","version":"0.616"},{"version":"0.617","date":"2008-01-28T11:55:50"},{"version":"0.618","date":"2008-02-14T12:56:25"},{"date":"2008-02-29T12:08:41","version":"0.619"},{"date":"2008-03-18T17:40:57","version":"0.620"},{"version":"0.6201","date":"2008-03-20T07:49:00"},{"version":"0.621","date":"2008-04-04T11:38:49"},{"version":"0.622","date":"2008-04-25T16:23:31"},{"version":"0.623","date":"2008-05-19T11:47:46"},{"version":"0.624","date":"2008-07-25T11:35:07"},{"date":"2008-07-30T12:02:43","version":"0.625"},{"version":"0.626","date":"2008-09-22T12:20:00"},{"version":"0.627","date":"2008-09-23T11:05:58"},{"version":"0.628","date":"2008-09-29T12:35:05"},{"date":"2008-10-13T15:09:27","version":"0.629"},{"version":"0.630","date":"2008-10-21T11:59:27"},{"date":"2008-11-10T14:37:44","version":"0.631"},{"version":"0.632","date":"2008-12-16T13:32:26"},{"version":"0.633","date":"2008-12-23T15:36:48"},{"version":"0.634","date":"2009-03-05T13:06:32"},{"date":"2009-04-20T12:21:46","version":"0.635"},{"version":"0.636","date":"2009-05-30T16:19:54"},{"version":"0.637","date":"2009-06-23T12:07:41"},{"date":"2009-06-30T11:31:35","version":"0.638"},{"date":"2009-09-08T11:35:25","version":"0.639"},{"date":"2009-09-09T16:10:41","version":"0.640"},{"date":"2010-01-20T17:30:14","version":"0.641"},{"date":"2010-01-21T17:17:34","version":"0.642"},{"date":"2010-02-25T13:04:52","version":"0.643"},{"date":"2010-03-12T15:24:45","version":"0.644"},{"date":"2010-03-28T14:53:46","version":"1.001"},{"version":"1.202","date":"2010-04-22T12:22:00"},{"date":"2010-06-03T11:09:45","version":"1.203"},{"date":"2010-06-03T11:20:09","version":"1.204"},{"date":"2010-06-07T16:04:03","version":"1.205"},{"date":"2010-08-13T10:53:09","version":"1.206"},{"date":"2010-09-14T16:14:40","version":"1.207"},{"version":"1.208","date":"2010-09-16T11:46:11"},{"version":"1.209","date":"2010-09-20T12:29:12"},{"version":"1.210","date":"2010-09-30T16:34:27"},{"version":"1.211","date":"2010-10-08T10:46:45"},{"version":"1.212","date":"2010-10-15T11:08:52"},{"version":"1.213","date":"2010-10-19T12:29:03"},{"version":"1.214","date":"2010-10-19T15:17:01"},{"date":"2010-10-19T15:28:56","version":"1.215"},{"date":"2010-10-26T12:16:51","version":"1.216"},{"version":"1.217","date":"2010-10-30T12:44:11"},{"date":"2010-11-05T11:53:14","version":"1.218"},{"date":"2010-11-09T13:20:51","version":"1.219"},{"date":"2010-11-10T08:41:22","version":"1.220"},{"version":"1.221","date":"2010-11-21T17:40:10"},{"date":"2010-11-22T14:01:55","version":"1.222"},{"date":"2010-11-28T17:34:03","version":"1.223"},{"date":"2010-12-06T13:18:53","version":"1.224"},{"date":"2010-12-07T08:01:43","version":"1.225"},{"version":"1.226","date":"2010-12-08T18:48:08"},{"date":"2011-01-07T18:12:45","version":"1.227"},{"date":"2011-01-09T12:27:15","version":"1.228"},{"version":"1.229","date":"2011-01-10T19:57:53"},{"version":"1.230","date":"2011-01-20T16:47:27"},{"version":"1.231","date":"2011-01-30T11:30:23"},{"date":"2011-01-30T13:51:34","version":"1.232"},{"version":"1.233","date":"2011-02-11T12:25:32"},{"version":"1.234","date":"2011-02-21T17:11:22"},{"version":"1.235","date":"2011-03-01T13:06:28"},{"date":"2011-04-01T14:09:03","version":"1.236"},{"version":"1.237","date":"2011-04-04T12:57:04"},{"version":"1.238","date":"2011-04-05T14:45:45"},{"date":"2011-04-05T17:40:17","version":"1.240"},{"date":"2011-04-07T18:09:49","version":"1.241"},{"date":"2011-04-25T15:28:14","version":"1.242"},{"date":"2011-05-02T12:33:33","version":"1.243"},{"version":"1.244","date":"2011-05-16T15:52:46"},{"version":"1.245","date":"2011-06-17T12:10:22"},{"version":"1.246","date":"2011-06-20T12:32:24"},{"version":"1.247","date":"2011-06-27T14:14:52"},{"date":"2011-07-05T15:48:52","version":"1.248"},{"date":"2011-07-12T09:54:39","version":"1.249"},{"version":"1.250","date":"2011-07-22T12:40:47"},{"version":"1.251","date":"2011-08-30T12:16:32"},{"date":"2011-09-01T16:06:19","version":"1.252"},{"date":"2011-09-02T16:03:35","version":"1.253"},{"date":"2011-09-04T15:21:52","version":"1.254"},{"version":"1.255","date":"2011-09-15T15:23:39"},{"date":"2011-09-16T12:28:51","version":"1.256"},{"date":"2011-09-23T10:52:00","version":"1.257"},{"version":"1.258","date":"2011-10-14T14:45:06"},{"version":"1.259","date":"2011-10-16T10:17:53"},{"date":"2011-10-28T13:28:02","version":"1.260"},{"version":"1.261","date":"2011-11-18T17:02:26"},{"version":"1.262","date":"2011-11-19T11:55:30"},{"date":"2011-11-29T15:43:38","version":"1.263"},{"date":"2011-11-30T07:50:25","version":"1.264"},{"version":"1.265","date":"2011-12-06T18:26:54"},{"date":"2012-02-06T11:55:29","version":"2.001"},{"date":"2012-02-08T09:49:49","version":"2.002"},{"version":"2.003","date":"2012-02-08T13:14:22"},{"date":"2012-02-09T11:28:18","version":"2.004"},{"version":"2.005","date":"2012-02-23T18:25:32"},{"version":"2.006","date":"2012-02-25T11:30:41"},{"version":"2.007","date":"2012-02-26T16:34:50"},{"date":"2012-03-01T12:40:23","version":"2.008"},{"date":"2012-03-13T13:11:49","version":"2.009"},{"date":"2012-03-13T13:15:03","version":"2.010"},{"date":"2012-03-19T21:41:44","version":"2.011"},{"version":"2.012","date":"2012-04-05T11:41:54"},{"date":"2012-04-06T12:10:46","version":"2.013"},{"version":"2.014","date":"2012-05-04T13:57:13"},{"version":"2.015","date":"2012-05-14T10:06:13"},{"date":"2012-05-20T08:38:36","version":"2.016"},{"version":"2.017","date":"2012-05-21T10:56:35"},{"version":"2.018","date":"2012-05-29T13:53:06"},{"version":"2.019","date":"2012-06-05T12:34:15"},{"date":"2012-06-18T08:34:26","version":"2.020"},{"date":"2012-06-27T14:44:55","version":"2.021_01"},{"date":"2012-06-28T15:30:52","version":"2.021"},{"version":"2.022","date":"2012-07-03T14:47:31"},{"date":"2012-07-04T13:50:37","version":"2.023"},{"date":"2012-09-04T11:30:02","version":"2.024"},{"date":"2012-09-10T10:52:02","version":"2.025"},{"version":"2.026_1","date":"2012-09-20T17:12:09"},{"version":"2.026_2","date":"2012-09-21T10:38:47"},{"version":"2.026","date":"2012-09-27T11:53:42"},{"date":"2012-10-30T12:48:16","version":"2.027"},{"version":"2.028","date":"2012-11-27T12:44:55"},{"version":"2.029","date":"2012-11-28T13:31:04"},{"date":"2013-02-27T18:37:05","version":"2.030_01"},{"date":"2013-03-23T09:47:53","version":"2.030"},{"version":"2.031","date":"2013-04-03T17:22:28"},{"version":"2.032","date":"2013-04-15T11:28:33"},{"date":"2013-04-15T19:27:14","version":"2.033"},{"date":"2013-04-17T19:29:52","version":"2.034"},{"version":"2.035","date":"2013-04-27T15:05:09"},{"date":"2013-05-25T17:53:04","version":"2.036"},{"date":"2013-06-15T17:46:45","version":"2.037"},{"version":"2.038","date":"2013-07-03T19:30:32"},{"date":"2013-07-18T18:12:07","version":"2.039"},{"date":"2013-07-20T09:46:11","version":"2.040"},{"date":"2013-08-14T17:58:40","version":"2.041"},{"version":"2.042","date":"2013-09-15T17:41:45"},{"version":"2.043","date":"2013-09-20T17:35:06"},{"date":"2013-10-13T16:02:40","version":"2.044"},{"version":"2.045","date":"2013-10-18T17:48:15"},{"date":"2013-12-15T13:07:37","version":"2.046"},{"date":"2014-01-25T15:54:37","version":"2.047"},{"version":"2.048","date":"2014-02-23T18:02:19"},{"version":"2.049","date":"2014-02-26T19:45:44"},{"version":"2.050","date":"2014-02-27T18:12:32"},{"date":"2014-03-06T18:23:11","version":"2.051"},{"version":"2.052","date":"2014-03-23T16:20:43"},{"date":"2014-03-25T19:11:57","version":"2.053"},{"date":"2014-04-01T17:51:50","version":"2.054"},{"date":"2014-05-02T11:33:28","version":"2.055"},{"version":"2.056","date":"2014-05-18T19:34:53"},{"version":"2.057","date":"2014-06-12T19:32:47"},{"date":"2014-06-19T19:43:18","version":"2.058"},{"date":"2014-06-29T15:08:02","version":"2.059"},{"version":"2.060","date":"2014-08-19T12:43:59"},{"date":"2014-09-23T19:21:04","version":"2.061"},{"date":"2014-11-23T19:45:05","version":"2.062"},{"date":"2014-11-28T17:55:21","version":"2.063"},{"version":"2.064","date":"2014-12-04T18:47:05"},{"version":"2.065","date":"2015-01-06T20:16:15"},{"version":"2.066","date":"2015-02-15T16:13:00"},{"date":"2015-03-01T18:38:28","version":"2.067"},{"version":"2.068","date":"2015-03-29T13:39:56"},{"version":"2.069","date":"2015-04-25T19:29:15"},{"version":"2.070","date":"2015-05-03T14:00:52"},{"date":"2015-05-23T11:15:16","version":"2.071"},{"version":"2.072","date":"2015-07-18T19:31:43"},{"version":"2.073","date":"2015-07-19T07:35:51"},{"date":"2015-09-30T18:56:39","version":"2.074"},{"version":"2.075","date":"2015-11-22T20:11:19"},{"version":"2.076","date":"2016-01-14T18:13:20"},{"date":"2016-01-20T19:55:36","version":"2.077"},{"version":"2.078","date":"2016-01-24T18:48:46"},{"version":"2.079","date":"2016-02-12T20:44:28"},{"version":"2.080","date":"2016-02-27T17:59:55"},{"date":"2016-02-29T19:01:45","version":"2.081"},{"date":"2016-03-29T18:22:30","version":"2.082"},{"version":"2.083","date":"2016-04-20T18:32:29"},{"date":"2016-05-26T17:35:53","version":"2.084"},{"version":"2.085","date":"2016-05-29T17:13:14"},{"date":"2016-06-04T19:28:08","version":"2.086"},{"date":"2016-06-29T17:35:35","version":"2.087"},{"version":"2.088","date":"2016-07-09T18:06:03"},{"version":"2.089","date":"2016-09-04T13:17:52"},{"date":"2016-09-10T16:07:07","version":"2.090"},{"version":"2.091","date":"2016-09-13T17:05:56"},{"date":"2016-09-23T17:46:04","version":"2.092"},{"version":"2.093","date":"2016-11-08T18:33:39"},{"version":"2.094","date":"2016-11-09T18:23:05"},{"date":"2016-12-06T18:01:00","version":"2.095"},{"date":"2016-12-11T20:28:14","version":"2.096"},{"date":"2016-12-22T17:35:34","version":"2.097"},{"version":"2.098","date":"2017-02-26T18:58:23"},{"version":"2.099","date":"2017-03-05T17:09:37"},{"date":"2017-03-18T12:06:34","version":"2.100"},{"version":"2.101","date":"2017-04-28T17:40:56"},{"date":"2017-05-14T19:10:40","version":"2.102"},{"date":"2017-05-25T08:15:17","version":"2.103"},{"version":"2.104","date":"2017-06-03T13:23:33"},{"version":"2.105","date":"2017-06-09T17:26:55"},{"version":"2.106","date":"2017-07-16T14:07:23"},{"date":"2017-08-30T19:12:10","version":"2.107"},{"version":"2.108","date":"2017-08-31T17:23:43"},{"date":"2017-09-18T17:52:57","version":"2.109"},{"date":"2017-09-21T19:12:32","version":"2.110"},{"version":"2.111","date":"2017-09-22T18:41:04"},{"date":"2017-10-01T09:12:45","version":"2.112"},{"date":"2017-10-12T19:07:46","version":"2.113"},{"date":"2017-11-11T16:35:03","version":"2.114"},{"version":"2.115","date":"2017-12-14T18:03:18"},{"version":"2.116","date":"2017-12-16T09:52:09"},{"date":"2018-02-03T18:09:35","version":"2.117"},{"version":"2.118","date":"2018-03-26T18:33:19"},{"version":"2.119","date":"2018-04-02T16:55:50"},{"version":"2.120","date":"2018-04-08T07:56:03"},{"version":"2.121","date":"2018-04-15T17:08:18"},{"date":"2018-04-17T17:20:14","version":"2.122"},{"version":"2.123","date":"2018-05-01T17:18:09"},{"date":"2018-06-09T17:16:59","version":"2.124"},{"version":"2.125","date":"2018-06-24T12:47:24"},{"date":"2018-08-20T13:10:09","version":"2.126"},{"date":"2018-09-30T16:44:13","version":"2.127"},{"version":"2.128","date":"2018-11-21T19:33:41"},{"date":"2018-12-05T18:44:58","version":"2.129"},{"version":"2.130","date":"2018-12-07T19:02:10"},{"date":"2018-12-16T18:32:58","version":"2.131"},{"date":"2018-12-22T17:50:27","version":"2.132"},{"version":"2.133","date":"2019-01-13T20:17:07"},{"version":"2.134","date":"2019-05-05T10:51:38"},{"date":"2019-06-05T17:21:24","version":"2.135"},{"date":"2019-07-29T15:44:09","version":"2.136"},{"date":"2019-12-01T17:32:00","version":"2.137"},{"date":"2019-12-27T14:43:21","version":"2.138"},{"version":"2.139","date":"2020-07-18T14:38:14"},{"date":"2020-07-31T08:24:37","version":"2.140"},{"date":"2021-01-17T18:04:01","version":"2.141"},{"date":"2021-04-07T17:08:47","version":"2.142"},{"version":"2.143","date":"2021-10-31T17:28:44"},{"date":"2021-11-04T17:26:40","version":"2.144"},{"date":"2021-11-06T18:23:25","version":"2.145"},{"date":"2021-11-28T18:13:47","version":"2.146"},{"version":"2.147","date":"2021-11-29T18:42:25"},{"version":"2.148","date":"2022-01-09T15:02:17"},{"date":"2022-01-13T16:42:50","version":"2.149"},{"version":"2.150","date":"2022-05-08T15:10:12"},{"date":"2022-07-26T14:32:41","version":"2.151"},{"version":"2.152","date":"2022-07-28T08:07:07"},{"version":"2.153","date":"2023-07-14T14:05:14"},{"date":"2023-07-14T17:35:53","version":"2.153"},{"date":"2024-06-15T14:47:56","version":"2.154"},{"version":"2.155","date":"2024-11-24T15:11:43"}],"main_module":"Config::Model","advisories":[{"reported":"2017-05-10","fixed_versions":[">=2.102"],"cves":["CVE-2017-0373"],"description":"The gen_class_pod implementation in lib/Config/Model/Utils/GenClassPod.pm in Config-Model (aka libconfig-model-perl) before 2.102 has a dangerous \"use lib\" line, which allows remote attackers to have an unspecified impact via a crafted Debian package file.\n","distribution":"Config-Model","id":"CPANSA-Config-Model-2017-03","affected_versions":["<2.102"],"references":["https://metacpan.org/changes/distribution/Config-Model","https://github.com/dod38fr/config-model/commit/9bd64d9ec6c0939166a2216a37d58dd19a725951"]},{"references":["https://metacpan.org/changes/distribution/Config-Model","https://github.com/dod38fr/config-model/commit/4d37c75b0c4f9633b67999f8260b08027a6bc524"],"affected_versions":["<2.102"],"id":"CPANSA-Config-Model-2017-02","reported":"2017-05-10","cves":["CVE-2017-0374"],"fixed_versions":[">=2.102"],"distribution":"Config-Model","description":"Loads models from a local directory, making it possible to substitute the model.\n"},{"affected_versions":["<2.102"],"references":["https://metacpan.org/changes/distribution/Config-Model","https://github.com/dod38fr/config-model/commit/01d212348bfbadf31bd74aadd26b1e391ff2fd92"],"id":"CPANSA-Config-Model-2017-01","reported":"2017-05-10","fixed_versions":[">=2.102"],"cves":[],"description":"YAML or YAML::XS can be loaded automatically making it possible to run arbitrary code loading a specially crafted YAML file.\n","distribution":"Config-Model"}]},"DBI":{"versions":[{"date":"1995-10-27T08:14:00","version":"0.64"},{"date":"1996-02-15T22:07:00","version":"0.67"},{"version":"0.68","date":"1996-04-22T10:22:00"},{"date":"1996-05-07T19:46:00","version":"0.69"},{"version":"0.70","date":"1996-06-16T21:08:00"},{"version":"0.71","date":"1996-07-10T00:49:00"},{"date":"1996-09-23T16:33:00","version":"0.72"},{"date":"1996-10-15T00:58:00","version":"0.73"},{"date":"1997-01-14T16:59:00","version":"0.74"},{"date":"1997-01-27T21:59:00","version":"0.75"},{"date":"1997-02-03T18:54:00","version":"0.76"},{"version":"0.77","date":"1997-02-21T14:27:00"},{"date":"1997-03-28T14:36:00","version":"0.78"},{"version":"0.79","date":"1997-04-07T18:28:00"},{"version":"0.80","date":"1997-05-07T11:45:00"},{"date":"1997-05-07T14:05:00","version":"0.81"},{"version":"0.82","date":"1997-05-23T15:56:00"},{"version":"0.83","date":"1997-06-11T21:40:00"},{"date":"1997-06-20T15:36:00","version":"0.84"},{"version":"0.85","date":"1997-06-25T10:25:00"},{"date":"1997-07-16T16:38:00","version":"0.001"},{"date":"1997-07-18T11:27:00","version":"0.87"},{"date":"1997-07-22T21:27:00","version":"0.88"},{"version":"0.89","date":"1997-07-25T13:46:55"},{"version":"0.90","date":"1997-09-05T19:38:52"},{"date":"1997-12-10T17:15:14","version":"0.91"},{"date":"1998-02-05T20:45:45","version":"0.92"},{"version":"0.93","date":"1998-02-13T15:21:52"},{"date":"1998-08-10T03:23:46","version":"0.94"},{"date":"1998-08-11T13:21:19","version":"0.95"},{"date":"1998-08-14T20:38:42","version":"1.00"},{"date":"1998-09-02T14:59:47","version":"1.01"},{"version":"1.02","date":"1998-09-04T12:29:52"},{"version":"1.06","date":"1999-01-18T21:52:15"},{"version":"1.08","date":"1999-05-13T01:49:11"},{"date":"1999-06-02T13:44:40","version":"1.08"},{"version":"1.09","date":"1999-06-09T20:57:59"},{"version":"1.10","date":"1999-06-13T23:52:03"},{"date":"1999-06-17T13:22:36","version":"1.11"},{"version":"1.12","date":"1999-06-29T23:07:41"},{"version":"1.13","date":"1999-07-12T03:28:41"},{"date":"2000-06-11T02:39:59","version":"1.03_80"},{"date":"2000-06-14T20:30:57","version":"1.14"},{"date":"2001-03-30T15:03:31","version":"1.15"},{"date":"2001-05-29T23:25:57","version":"1.16"},{"date":"2001-06-04T17:12:30","version":"1.17"},{"version":"1.18","date":"2001-06-04T19:00:37"},{"date":"2001-07-20T22:29:24","version":"1.19"},{"date":"2001-08-24T23:32:10","version":"1.20"},{"version":"1.201","date":"2002-01-10T15:25:45"},{"version":"1.21","date":"2002-02-07T03:30:16"},{"date":"2002-03-13T14:18:00","version":"1.21"},{"date":"2002-05-22T13:42:15","version":"1.22"},{"version":"1.23","date":"2002-05-25T17:38:03"},{"date":"2002-06-05T03:32:38","version":"1.24"},{"version":"1.25","date":"2002-06-05T22:42:04"},{"version":"1.26","date":"2002-06-13T12:30:47"},{"date":"2002-06-13T15:19:06","version":"1.27"},{"version":"1.28","date":"2002-06-14T13:13:53"},{"date":"2002-06-26T09:34:24","version":"1.28"},{"version":"1.29","date":"2002-07-15T11:24:40"},{"date":"2002-07-18T14:27:25","version":"1.30"},{"version":"1.31","date":"2002-11-30T00:49:54"},{"version":"1.32","date":"2002-12-01T23:01:26"},{"date":"2002-12-20T16:23:29","version":"1.32"},{"date":"2003-02-26T18:01:24","version":"1.32_90"},{"version":"1.33","date":"2003-02-27T00:25:32"},{"date":"2003-02-28T17:53:35","version":"1.34"},{"date":"2003-03-07T22:02:20","version":"1.35"},{"version":"1.36","date":"2003-05-14T11:13:39"},{"date":"2003-05-15T18:02:26","version":"1.37"},{"date":"2003-08-25T20:36:26","version":"1.38"},{"date":"2003-11-27T23:46:40","version":"1.39"},{"date":"2004-01-08T14:04:59","version":"1.39"},{"date":"2004-02-23T14:54:21","version":"1.41"},{"date":"2004-03-12T16:40:08","version":"1.41"},{"version":"1.43","date":"2004-07-05T10:02:05"},{"version":"1.44","date":"2004-10-05T21:27:23"},{"date":"2004-10-06T13:49:20","version":"1.45"},{"date":"2004-11-16T12:38:32","version":"1.46"},{"date":"2005-02-02T11:28:46","version":"1.47"},{"version":"1.48","date":"2005-03-14T17:03:33"},{"date":"2005-11-29T19:59:40","version":"1.49"},{"date":"2005-12-14T16:55:16","version":"1.50"},{"date":"2006-04-19T15:56:38","version":"1.45"},{"date":"2006-06-06T12:08:36","version":"1.51"},{"date":"2006-08-08T21:13:32","version":"1.52"},{"version":"1.53","date":"2006-11-02T00:38:01"},{"date":"2007-02-23T17:15:23","version":"1.54"},{"version":"1.55","date":"2007-05-04T14:56:38"},{"version":"1.56","date":"2007-05-10T14:04:04"},{"version":"1.56","date":"2007-05-13T22:00:58"},{"date":"2007-06-13T16:45:34","version":"1.57"},{"version":"1.57","date":"2007-06-15T17:06:42"},{"version":"1.57","date":"2007-06-18T15:15:31"},{"date":"2007-06-25T22:11:47","version":"1.58"},{"date":"2007-08-22T17:02:10","version":"1.59"},{"version":"1.59","date":"2007-08-23T12:22:26"},{"date":"2007-08-23T13:59:53","version":"1.59"},{"date":"2007-08-24T09:19:29","version":"1.59"},{"date":"2007-10-16T13:12:55","version":"1.601"},{"date":"2007-10-21T22:12:52","version":"1.601"},{"date":"2008-02-09T22:06:13","version":"1.602"},{"date":"2008-03-22T00:11:03","version":"1.603"},{"date":"2008-03-24T14:11:41","version":"1.604"},{"version":"1.605","date":"2008-06-16T19:19:43"},{"version":"1.606","date":"2008-07-22T21:01:09"},{"date":"2008-07-22T21:50:54","version":"1.607"},{"version":"1.608","date":"2009-05-02T22:58:48"},{"version":"1.608","date":"2009-05-05T12:05:19"},{"date":"2009-06-05T22:57:34","version":"1.609"},{"version":"1.609","date":"2009-06-08T10:29:18"},{"version":"1.611","date":"2010-03-02T21:26:39"},{"date":"2010-04-22T11:06:31","version":"1.611"},{"date":"2010-04-27T15:13:32","version":"1.611"},{"version":"1.611","date":"2010-04-29T19:54:44"},{"version":"1.612","date":"2010-05-28T10:29:17"},{"date":"2010-06-15T22:47:23","version":"1.612"},{"date":"2010-06-16T19:18:05","version":"1.612"},{"version":"1.612","date":"2010-07-02T14:26:03"},{"version":"1.612","date":"2010-07-15T15:00:53"},{"version":"1.612","date":"2010-07-16T19:36:42"},{"version":"1.613","date":"2010-07-22T17:34:16"},{"date":"2010-07-25T15:50:15","version":"1.613"},{"date":"2010-07-30T14:17:33","version":"1.614"},{"version":"1.614","date":"2010-08-16T16:34:58"},{"version":"1.614","date":"2010-08-30T20:11:00"},{"date":"2010-08-30T20:26:37","version":"1.614"},{"date":"2010-08-30T20:56:09","version":"1.614"},{"version":"1.614","date":"2010-09-02T15:44:21"},{"date":"2010-09-09T10:24:11","version":"1.614"},{"date":"2010-09-16T16:23:50","version":"1.614"},{"date":"2010-09-17T09:48:02","version":"1.614"},{"date":"2010-09-21T10:14:29","version":"1.615"},{"version":"1.615","date":"2010-09-22T12:28:20"},{"date":"2010-12-18T21:51:52","version":"1.616"},{"version":"1.616","date":"2010-12-21T23:26:46"},{"version":"1.616","date":"2010-12-29T14:39:48"},{"version":"1.616","date":"2010-12-30T10:26:51"},{"version":"1.617","date":"2012-01-02T17:12:53"},{"date":"2012-01-28T09:34:18","version":"1.617"},{"version":"1.617","date":"2012-01-30T10:06:49"},{"date":"2012-02-07T22:54:02","version":"1.618"},{"date":"2012-02-13T18:24:33","version":"1.618"},{"date":"2012-02-23T11:05:45","version":"1.618"},{"date":"2012-02-25T14:24:39","version":"1.618"},{"version":"1.619","date":"2012-04-18T11:57:55"},{"date":"2012-04-20T20:21:54","version":"1.619"},{"version":"1.619","date":"2012-04-23T22:09:14"},{"version":"1.620","date":"2012-04-25T12:46:54"},{"version":"1.621","date":"2012-05-21T13:06:09"},{"date":"2012-05-22T22:17:06","version":"1.621"},{"date":"2012-06-06T16:51:00","version":"1.622"},{"version":"1.623","date":"2012-07-13T15:24:35"},{"version":"1.623","date":"2012-10-30T13:01:14"},{"date":"2012-11-19T23:27:04","version":"1.623"},{"date":"2012-12-13T16:26:23","version":"1.623"},{"date":"2012-12-21T17:22:01","version":"1.623"},{"version":"1.623","date":"2013-01-02T10:09:42"},{"date":"2013-03-22T20:41:50","version":"1.624"},{"date":"2013-03-28T21:59:38","version":"1.625"},{"version":"1.626","date":"2013-05-15T11:28:03"},{"date":"2013-05-16T20:30:50","version":"1.627"},{"version":"1.628","date":"2013-06-24T21:56:27"},{"date":"2013-06-24T22:12:23","version":"1.628"},{"date":"2013-06-30T19:08:08","version":"1.628"},{"date":"2013-07-02T11:27:23","version":"1.628"},{"date":"2013-07-22T13:22:40","version":"1.628"},{"version":"1.629","date":"2013-10-11T12:28:12"},{"version":"1.629","date":"2013-10-13T16:02:52"},{"date":"2013-10-15T12:24:53","version":"1.629"},{"version":"1.629_50","date":"2013-10-22T11:58:53"},{"version":"1.630","date":"2013-10-28T12:51:39"},{"version":"1.631","date":"2014-01-13T13:51:01"},{"version":"1.631","date":"2014-01-16T11:34:34"},{"version":"1.631","date":"2014-01-20T11:12:44"},{"date":"2014-10-23T14:08:22","version":"1.631"},{"version":"1.632","date":"2014-11-05T11:15:07"},{"date":"2015-01-08T14:31:52","version":"1.632"},{"date":"2015-01-11T13:26:05","version":"1.633"},{"date":"2015-07-18T13:16:07","version":"1.633"},{"version":"1.633_91","date":"2015-07-19T14:34:22"},{"version":"1.633_92","date":"2015-07-22T15:27:59"},{"version":"1.633_93","date":"2015-08-02T16:52:48"},{"date":"2015-08-03T14:52:56","version":"1.634"},{"version":"1.634","date":"2016-04-23T15:28:02"},{"date":"2016-04-24T11:57:03","version":"1.635"},{"version":"1.636","date":"2016-04-24T22:20:56"},{"version":"1.637","date":"2017-08-14T10:10:55"},{"date":"2017-08-16T09:02:40","version":"1.637"},{"version":"1.639","date":"2017-12-28T14:40:44"},{"version":"1.640","date":"2018-01-28T20:50:53"},{"version":"1.641","date":"2018-03-19T18:06:08"},{"date":"2018-10-28T15:08:54","version":"1.641_90"},{"version":"1.642","date":"2018-10-29T10:43:41"},{"version":"1.642_90","date":"2020-01-26T20:48:52"},{"date":"2020-01-31T19:02:41","version":"1.643"},{"version":"1.643_01","date":"2024-08-20T11:29:56"},{"version":"1.643_02","date":"2024-08-22T07:09:52"},{"version":"1.644","date":"2024-08-23T17:54:09"},{"date":"2024-09-03T09:25:33","version":"1.645"},{"version":"1.646","date":"2025-01-11T12:59:58"},{"date":"2025-01-20T08:14:47","version":"1.647"}],"main_module":"DBI","advisories":[{"severity":"high","references":["https://metacpan.org/changes/distribution/DBI","https://bugzilla.redhat.com/show_bug.cgi?id=1877409"],"affected_versions":["<1.643"],"id":"CPANSA-DBI-2020-01","reported":"2020-09-16","fixed_versions":[">=1.643"],"cves":["CVE-2020-14393"],"distribution":"DBI","description":"A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.\n"},{"description":"An untrusted pointer dereference flaw was found in Perl-DBI < 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service's availability.\n","distribution":"DBI","cves":["CVE-2020-14392"],"reported":"2020-06-17","fixed_versions":[">=1.643"],"id":"CPANSA-DBI-2020-03","references":["https://metacpan.org/changes/distribution/DBI","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXLKODJ7B57GITDEZZXNSHPK4VBYXYHR/","https://bugzilla.redhat.com/show_bug.cgi?id=1877402","https://bugzilla.redhat.com/show_bug.cgi?id=1877402","https://lists.debian.org/debian-lts-announce/2020/09/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00067.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00074.html","https://usn.ubuntu.com/4503-1/"],"affected_versions":["<1.643"],"severity":"high"},{"id":"CPANSA-DBI-2020-02","distribution":"DBI","description":"An issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference.\n","cves":["CVE-2019-20919"],"reported":"2020-09-17","fixed_versions":[">=1.643"],"severity":"high","references":["https://metacpan.org/changes/distribution/DBI","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXLKODJ7B57GITDEZZXNSHPK4VBYXYHR/","https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20919","https://github.com/perl5-dbi/dbi/commit/eca7d7c8f43d96f6277e86d1000e842eb4cc67ff","https://bugzilla.redhat.com/show_bug.cgi?id=1877405","https://lists.debian.org/debian-lts-announce/2020/09/msg00026.html","https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/US6VXPKVAYHOKNFSAFLM3FWNYZSJKQHS/","https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KJN7E27GD6QQ2CRGEJ3TNW2DJFXA2AKN/","https://ubuntu.com/security/notices/USN-4534-1"],"affected_versions":["<1.643"]},{"affected_versions":["<1.632"],"references":["https://metacpan.org/changes/distribution/DBI","https://rt.cpan.org/Public/Bug/Display.html?id=99508"],"severity":"high","cves":[],"reported":"2014-10-15","fixed_versions":[">=1.632"],"distribution":"DBI","description":"DBD::File drivers open files from folders other than specifically passed using the f_dir attribute.\n","id":"CPANSA-DBI-2014-01"},{"references":["https://metacpan.org/changes/distribution/DBI"],"affected_versions":["<1.47"],"id":"CPANSA-DBI-2005-01","distribution":"DBI","description":"Allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.\n","cves":["CVE-2005-0077"],"reported":"2005-05-02","fixed_versions":[">=1.47"]},{"severity":"medium","references":["https://rt.cpan.org/Public/Bug/Display.html?id=99508#txn-1911590","https://metacpan.org/release/HMBRAND/DBI-1.643_01/view/Changes"],"affected_versions":["<1.643"],"id":"CPANSA-DBI-2014-10402","distribution":"DBI","description":"An issue was discovered in the DBI module through 1.643 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute in the data source name (DSN). NOTE: this issue exists because of an incomplete fix for CVE-2014-10401.\n","reported":"2020-09-16","cves":["CVE-2014-10402"],"fixed_versions":[">=1.644"]},{"severity":"medium","affected_versions":["<1.632"],"references":["https://rt.cpan.org/Public/Bug/Display.html?id=99508","https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.632-9th-Nov-2014","https://github.com/perl5-dbi/dbi/commit/caedc0d7d602f5b2ae5efc1b00f39efeafb7b05a","https://usn.ubuntu.com/4509-1/","https://metacpan.org/release/HMBRAND/DBI-1.643_01/view/Changes"],"id":"CPANSA-DBI-2014-10401","distribution":"DBI","description":"An issue was discovered in the DBI module before 1.632 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute.\n","fixed_versions":[">=1.644"],"reported":"2020-09-11","cves":["CVE-2014-10401"]},{"severity":"medium","affected_versions":["<1.628"],"references":["https://github.com/perl5-dbi/dbi/commit/401f1221311c71f760e21c98772f0f7e3cbead1d","https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.628-22nd-July-2013","https://rt.cpan.org/Public/Bug/Display.html?id=85562"],"id":"CPANSA-DBI-2013-7491","reported":"2020-09-11","cves":["CVE-2013-7491"],"fixed_versions":[">=1.628"],"distribution":"DBI","description":"An issue was discovered in the DBI module before 1.628 for Perl. Stack corruption occurs when a user-defined function requires a non-trivial amount of memory and the Perl stack gets reallocated.\n"},{"cves":["CVE-2013-7490"],"reported":"2020-09-11","fixed_versions":[">=1.632"],"description":"An issue was discovered in the DBI module before 1.632 for Perl. Using many arguments to methods for Callbacks may lead to memory corruption.\n","distribution":"DBI","id":"CPANSA-DBI-2013-7490","affected_versions":["<1.632"],"references":["https://github.com/perl5-dbi/dbi/commit/a8b98e988d6ea2946f5f56691d6d5ead53f65766","https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.632-9th-Nov-2014","https://rt.cpan.org/Public/Bug/Display.html?id=86744#txn-1880941","https://usn.ubuntu.com/4509-1/"],"severity":"medium"}]},"File-KeePass":{"main_module":"File::KeePass","versions":[{"version":"0.01","date":"2010-06-29T14:52:50"},{"version":"0.02","date":"2010-12-04T04:33:41"},{"date":"2010-12-07T06:06:57","version":"0.03"},{"version":"2.00","date":"2012-09-13T04:48:56"},{"version":"2.01","date":"2012-09-13T14:17:11"},{"version":"2.02","date":"2012-09-13T15:22:40"},{"version":"2.03","date":"2012-09-15T22:25:43"}],"advisories":[{"reported":"2016-09-14","fixed_versions":[],"cves":[],"description":"The module is making use of the perl rand function for key and iv generation (for Crypt::Rijndael).\n","distribution":"File-KeePass","id":"CPANSA-File-KeePass-2016-01","references":["https://rt.cpan.org/Ticket/Display.html?id=117836"],"affected_versions":[">0"],"severity":null}]},"Net-Server":{"main_module":"Net::Server","versions":[{"version":"0.46","date":"2001-03-05T14:48:26"},{"version":"0.47","date":"2001-03-08T14:37:30"},{"date":"2001-03-13T16:35:32","version":"0.52"},{"date":"2001-03-20T06:55:22","version":"0.55"},{"date":"2001-04-09T16:54:28","version":"0.58"},{"date":"2001-05-10T15:05:54","version":"0.63"},{"date":"2001-07-05T15:19:21","version":"0.65"},{"date":"2001-08-23T17:45:28","version":"0.75"},{"date":"2001-08-27T16:15:20","version":"0.77"},{"version":"0.79","date":"2001-10-24T16:30:10"},{"version":"0.80","date":"2001-11-14T17:30:01"},{"date":"2001-11-19T20:57:43","version":"0.81"},{"date":"2002-02-05T21:55:06","version":"0.82"},{"version":"0.84","date":"2002-06-20T20:21:27"},{"version":"0.85","date":"2003-03-07T15:29:18"},{"version":"0.86","date":"2003-11-06T20:11:03"},{"date":"2004-02-15T06:20:34","version":"0.87"},{"version":"0.88","date":"2005-05-05T01:51:14"},{"date":"2005-06-21T21:24:27","version":"0.88"},{"version":"0.89","date":"2005-11-23T08:40:11"},{"date":"2005-12-05T21:19:07","version":"0.90"},{"version":"0.91","date":"2006-03-08T22:27:33"},{"version":"0.92","date":"2006-03-22T17:26:29"},{"version":"0.93","date":"2006-03-24T20:03:25"},{"date":"2006-07-12T02:54:02","version":"0.94"},{"date":"2007-02-03T08:23:04","version":"0.95"},{"version":"0.96","date":"2007-03-26T15:01:13"},{"date":"2007-07-25T16:29:47","version":"0.97"},{"version":"0.99","date":"2010-07-13T19:27:21"},{"date":"2011-07-22T12:36:35","version":"0.99.6.1"},{"version":"2.000","date":"2012-05-30T15:41:07"},{"version":"2.001","date":"2012-05-30T21:48:13"},{"date":"2012-05-31T21:43:35","version":"2.002"},{"version":"2.003","date":"2012-06-06T19:31:21"},{"date":"2012-06-08T17:22:50","version":"2.004"},{"date":"2012-06-12T19:40:55","version":"2.005"},{"date":"2012-06-20T22:51:22","version":"2.006"},{"date":"2013-01-10T07:47:04","version":"2.007"},{"date":"2014-05-12T18:22:26","version":"2.008"},{"date":"2017-08-10T21:13:01","version":"2.009"},{"version":"2.010","date":"2021-03-22T15:23:31"},{"version":"2.011","date":"2022-12-02T00:35:10"},{"date":"2022-12-02T04:19:54","version":"2.012"},{"date":"2022-12-03T01:57:05","version":"2.013"},{"date":"2023-03-14T17:16:00","version":"2.014"}],"advisories":[{"id":"CPANSA-Net-Server-2005-1127","cves":["CVE-2005-1127"],"reported":"2005-05-02","fixed_versions":[">0.87"],"description":"Format string vulnerability in the log function in Net::Server 0.87 and earlier, as used in Postfix Greylisting Policy Server (Postgrey) 1.18 and earlier, and possibly other products, allows remote attackers to cause a denial of service (crash) via format string specifiers that are not properly handled before being sent to syslog, as demonstrated using sender addresses to Postgrey.\n","distribution":"Net-Server","severity":null,"affected_versions":["<=0.87"],"references":["http://lists.ee.ethz.ch/postgrey/msg00627.html","http://lists.ee.ethz.ch/postgrey/msg00630.html","http://lists.ee.ethz.ch/postgrey/msg00647.html","http://www.osvdb.org/15517","http://secunia.com/advisories/14958","http://www.debian.org/security/2006/dsa-1121","http://www.debian.org/security/2006/dsa-1122","http://secunia.com/advisories/21164","http://secunia.com/advisories/21152","http://secunia.com/advisories/21149","http://www.gentoo.org/security/en/glsa/glsa-200608-18.xml","http://www.securityfocus.com/bid/13193","http://secunia.com/advisories/21452","http://www.mandriva.com/security/advisories?name=MDKSA-2006:131","http://marc.info/?l=full-disclosure&m=111354538331167&w=2","https://exchange.xforce.ibmcloud.com/vulnerabilities/20108"]}]},"eperl":{"advisories":[{"reported":"2001-10-18","fixed_versions":[],"cves":["CVE-2001-0733"],"description":"The #sinclude directive in Embedded Perl (ePerl) 2.2.14 and earlier allows a remote attacker to execute arbitrary code by modifying the 'sinclude' file to point to another file that contains a #include directive that references a file that contains the code.\n","distribution":"eperl","id":"CPANSA-ePerl-2001-0733","references":["http://www.securityfocus.com/archive/1/192711","http://www.securityfocus.com/bid/2912","https://exchange.xforce.ibmcloud.com/vulnerabilities/6743"],"affected_versions":["<=2.2.14"],"severity":null}],"main_module":"Parse::ePerl","versions":[{"date":"1996-09-08T09:22:26","version":"1.4"},{"date":"1997-01-20T06:55:18","version":"v2.0.3"},{"version":"2.1","date":"1997-03-25T09:19:29"},{"version":"2.1","date":"1997-04-03T12:24:29"},{"version":"2.1","date":"1997-04-05T08:04:08"},{"version":"2.1","date":"1997-04-18T16:36:34"},{"version":"v2.1.0","date":"1997-04-27T15:20:23"},{"version":"v2.1.1","date":"1997-05-04T20:06:49"},{"version":"2.2","date":"1997-05-29T10:26:35"},{"date":"1997-05-30T06:24:00","version":"v2.1.2"},{"date":"1997-05-30T16:53:19","version":"2.2"},{"version":"2.2","date":"1997-06-06T07:37:49"},{"version":"2.2","date":"1997-06-28T15:59:18"},{"date":"1997-07-19T08:23:43","version":"v2.2.0"},{"version":"v2.2.2","date":"1997-08-14T15:16:02"},{"version":"v2.2.3","date":"1997-08-21T15:44:18"},{"version":"v2.2.4","date":"1997-09-01T14:16:42"},{"version":"v2.2.5","date":"1997-09-03T10:33:40"},{"date":"1997-10-28T13:28:21","version":"v2.2.6"},{"version":"v2.2.8","date":"1997-11-17T16:37:11"},{"date":"1998-01-02T11:42:11","version":"v2.2.12"},{"version":"v2.2.13","date":"1998-07-10T09:22:54"}]},"LWP-Protocol-Net-Curl":{"main_module":"LWP::Protocol::Net::Curl","versions":[{"date":"2012-10-24T18:49:20","version":"0.001"},{"date":"2012-10-26T20:05:13","version":"0.002"},{"date":"2012-10-29T18:55:46","version":"0.003"},{"date":"2012-10-31T13:01:46","version":"0.004"},{"version":"0.005","date":"2012-11-01T15:17:14"},{"date":"2012-11-12T12:23:09","version":"0.006"},{"version":"0.007","date":"2012-11-13T14:33:10"},{"version":"0.008","date":"2012-11-25T22:38:58"},{"date":"2012-11-28T19:03:10","version":"0.009"},{"date":"2012-12-07T00:13:55","version":"0.010"},{"date":"2012-12-18T12:05:00","version":"0.011"},{"version":"0.012","date":"2013-02-08T11:00:04"},{"date":"2013-02-11T01:56:30","version":"0.013"},{"date":"2013-02-16T12:51:03","version":"0.014"},{"date":"2013-05-13T21:41:47","version":"0.015"},{"version":"0.016","date":"2013-05-18T22:12:03"},{"version":"0.017","date":"2013-07-13T12:22:34"},{"version":"0.018","date":"2013-08-17T11:34:49"},{"date":"2013-10-11T12:33:53","version":"0.019"},{"date":"2013-10-13T09:02:17","version":"0.020"},{"date":"2014-01-21T17:46:37","version":"0.021"},{"version":"0.022","date":"2014-07-09T15:04:06"},{"date":"2014-12-23T17:06:56","version":"0.023"},{"date":"2019-07-12T12:27:08","version":"0.024"},{"version":"0.025","date":"2019-07-15T11:29:17"},{"date":"2019-10-08T12:01:54","version":"0.026"},{"date":"2025-01-21T10:57:04","version":"0.027"}],"advisories":[{"references":["https://metacpan.org/changes/distribution/LWP-Protocol-Net-Curl","https://github.com/creaktive/LWP-Protocol-Net-Curl/commit/dc8b183c6520a2b6bcde685de635675ee4a7e019"],"affected_versions":["<0.009"],"distribution":"LWP-Protocol-Net-Curl","description":"Misconfiguration with libcurl v7.28.1 causes a HTTPS validation issues.\n","reported":"2012-11-28","fixed_versions":[">=0.009"],"cves":[],"id":"CPANSA-LWP-Protocol-Net-Curl-2012-01"}]},"App-Context":{"versions":[{"date":"2002-10-10T21:31:39","version":"0.01"},{"date":"2004-09-02T21:17:44","version":"0.90"},{"version":"0.93","date":"2005-01-07T14:02:06"},{"version":"0.95","date":"2005-08-09T20:05:02"},{"date":"2006-03-10T04:24:13","version":"0.96"},{"version":"0.962","date":"2006-03-12T01:30:11"},{"date":"2006-07-25T02:30:21","version":"0.963"},{"version":"0.964","date":"2006-09-04T19:41:12"},{"version":"0.965","date":"2007-04-17T13:33:24"},{"date":"2008-02-27T03:13:41","version":"0.966"},{"date":"2008-02-27T14:19:23","version":"0.9661"},{"date":"2009-09-11T14:31:52","version":"0.967"},{"version":"0.968","date":"2010-06-09T21:33:19"}],"main_module":"App::Context","advisories":[{"fixed_versions":[">0.968"],"reported":"2014-06-04","cves":["CVE-2012-6141"],"distribution":"App-Context","description":"The App::Context module 0.01 through 0.968 for Perl does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via a crafted request to (1) App::Session::Cookie or (2) App::Session::HTMLHidden, which is not properly handled when it is deserialized.\n","id":"CPANSA-App-Context-2012-6141","affected_versions":[">=0.01,<=0.968"],"references":["http://seclists.org/oss-sec/2013/q2/318","https://exchange.xforce.ibmcloud.com/vulnerabilities/84198"],"severity":null}]},"Data-Dumper":{"advisories":[{"references":["https://metacpan.org/changes/distribution/Data-Dumper"],"affected_versions":["<2.154"],"id":"CPANSA-Data-Dumper-2014-01","description":"Infinite recursion.\n","distribution":"Data-Dumper","reported":"2014-09-30","cves":["CVE-2014-4330"],"fixed_versions":[">=2.154"]}],"versions":[{"date":"1995-11-19T22:29:08","version":"1.21"},{"date":"1995-11-23T05:45:27","version":"1.22"},{"version":"1.23","date":"1995-12-04T03:12:16"},{"date":"1996-04-09T15:54:26","version":"2.00"},{"version":"2.01","date":"1996-04-10T04:25:17"},{"date":"1996-04-13T07:14:35","version":"2.02"},{"version":"2.03","date":"1996-08-26T14:36:59"},{"version":"2.04","date":"1996-08-28T20:11:49"},{"version":"2.05","date":"1996-12-02T13:42:49"},{"date":"1996-12-02T23:07:56","version":"2.06"},{"date":"1996-12-07T17:28:27","version":"2.07"},{"version":"2.08","date":"1997-12-07T21:27:09"},{"version":"2.081","date":"1998-01-15T20:36:46"},{"date":"1998-03-06T21:08:49","version":"2.081"},{"version":"2.09","date":"1998-07-17T05:23:08"},{"version":"2.09","date":"1998-07-21T12:08:19"},{"version":"2.10","date":"1998-10-31T12:10:30"},{"version":"2.101","date":"1999-05-01T02:01:03"},{"date":"1999-06-02T01:30:55","version":"2.101"},{"date":"2003-07-20T16:59:48","version":"2.12_01"},{"version":"2.12_02","date":"2003-07-31T19:12:44"},{"date":"2003-08-25T11:49:41","version":"2.121"},{"version":"2.121_20","date":"2009-06-06T14:45:36"},{"date":"2009-06-09T15:49:12","version":"2.122"},{"date":"2009-06-11T08:07:01","version":"2.123"},{"version":"2.124","date":"2009-06-13T15:22:32"},{"version":"2.125","date":"2009-08-08T10:33:01"},{"date":"2010-04-15T19:55:01","version":"2.126"},{"version":"2.126_01","date":"2010-09-06T14:28:10"},{"date":"2010-09-10T07:08:41","version":"2.127"},{"date":"2010-09-10T07:11:52","version":"2.128"},{"date":"2011-05-20T15:53:12","version":"2.130_03"},{"version":"2.131","date":"2011-05-27T14:19:03"},{"version":"2.135_01","date":"2011-12-19T08:23:05"},{"version":"2.135_02","date":"2011-12-29T17:09:49"},{"date":"2012-08-07T06:59:51","version":"2.135_07"},{"date":"2012-10-04T07:35:07","version":"2.136"},{"version":"2.139","date":"2012-12-12T06:30:48"},{"date":"2013-02-26T06:57:29","version":"2.143"},{"date":"2013-03-15T09:46:49","version":"2.145"},{"version":"2.151","date":"2014-03-07T09:28:44"},{"date":"2014-09-18T15:47:37","version":"2.154"},{"version":"2.160","date":"2016-07-03T19:17:57"},{"date":"2016-07-11T20:13:06","version":"2.161"},{"version":"2.167_01","date":"2017-07-31T15:31:28"},{"version":"2.167_02","date":"2017-08-04T08:05:22"},{"date":"2018-09-19T14:41:58","version":"2.172"},{"version":"2.173","date":"2018-11-10T10:10:30"},{"version":"2.179_50","date":"2021-05-14T12:47:34"},{"version":"2.180","date":"2021-05-17T05:53:02"},{"date":"2021-05-22T09:51:29","version":"2.180_50"},{"version":"2.180_51","date":"2021-05-23T14:14:12"},{"version":"2.180_52","date":"2021-05-24T08:03:55"},{"date":"2021-05-25T05:20:34","version":"2.180_53"},{"version":"2.181","date":"2021-05-26T06:46:41"},{"version":"2.181_50","date":"2021-06-29T10:42:11"},{"date":"2021-06-30T09:36:34","version":"2.182"},{"date":"2021-07-01T07:05:45","version":"2.182_50"},{"version":"2.182_51","date":"2021-07-03T13:07:49"},{"date":"2021-07-05T07:07:44","version":"2.183"},{"version":"2.102","dual_lived":1,"perl_release":"5.006001","date":"2001-04-08T00:00:00"},{"date":"2002-03-05T00:00:00","dual_lived":1,"version":"2.12","perl_release":"5.007003"},{"date":"2004-11-27T00:00:00","version":"2.121_02","dual_lived":1,"perl_release":"5.008006"},{"date":"2005-05-30T00:00:00","perl_release":"5.008007","dual_lived":1,"version":"2.121_04"},{"version":"2.121_08","dual_lived":1,"perl_release":"5.008008","date":"2006-01-31T00:00:00"},{"date":"2008-12-14T00:00:00","version":"2.121_17","dual_lived":1,"perl_release":"5.008009"},{"date":"2007-07-07T00:00:00","dual_lived":1,"version":"2.121_13","perl_release":"5.009005"},{"date":"2007-12-18T00:00:00","perl_release":"5.010000","dual_lived":1,"version":"2.121_14"},{"dual_lived":1,"version":"2.129","perl_release":"5.013006","date":"2010-10-20T00:00:00"},{"perl_release":"5.013007","version":"2.130_01","dual_lived":1,"date":"2010-11-20T00:00:00"},{"perl_release":"5.013008","version":"2.130_02","dual_lived":1,"date":"2010-12-20T00:00:00"},{"perl_release":"5.015002","version":"2.132","dual_lived":1,"date":"2011-08-20T00:00:00"},{"perl_release":"5.015003","dual_lived":1,"version":"2.134","date":"2011-09-20T00:00:00"},{"version":"2.135_03","dual_lived":1,"perl_release":"5.015007","date":"2012-01-20T00:00:00"},{"perl_release":"5.015008","dual_lived":1,"version":"2.135_05","date":"2012-02-20T00:00:00"},{"date":"2012-03-20T00:00:00","version":"2.135_06","dual_lived":1,"perl_release":"5.015009"},{"version":"2.137","dual_lived":1,"perl_release":"5.017006","date":"2012-11-20T00:00:00"},{"perl_release":"5.017008","version":"2.141","dual_lived":1,"date":"2013-01-20T00:00:00"},{"date":"2013-02-20T00:00:00","dual_lived":1,"version":"2.142","perl_release":"5.017009"},{"date":"2013-06-21T00:00:00","perl_release":"5.019001","dual_lived":1,"version":"2.146"},{"date":"2013-07-22T00:00:00","version":"2.147","dual_lived":1,"perl_release":"5.019002"},{"dual_lived":1,"version":"2.148","perl_release":"5.019003","date":"2013-08-20T00:00:00"},{"date":"2013-09-20T00:00:00","perl_release":"5.019004","version":"2.149","dual_lived":1},{"perl_release":"5.019007","dual_lived":1,"version":"2.150","date":"2013-12-20T00:00:00"},{"date":"2015-02-14T00:00:00","dual_lived":1,"version":"2.151_01","perl_release":"5.020002"},{"dual_lived":1,"version":"2.152","perl_release":"5.021001","date":"2014-06-20T00:00:00"},{"version":"2.155","dual_lived":1,"perl_release":"5.021007","date":"2014-12-20T00:00:00"},{"date":"2015-01-20T00:00:00","dual_lived":1,"version":"2.156","perl_release":"5.021008"},{"date":"2015-02-21T00:00:00","perl_release":"5.021009","version":"2.157","dual_lived":1},{"version":"2.158","dual_lived":1,"perl_release":"5.02101","date":"2015-03-20T00:00:00"},{"date":"2015-12-21T00:00:00","dual_lived":1,"version":"2.159","perl_release":"5.023006"},{"date":"2016-10-20T00:00:00","perl_release":"5.025006","version":"2.162","dual_lived":1},{"perl_release":"5.025007","dual_lived":1,"version":"2.165","date":"2016-11-20T00:00:00"},{"date":"2016-12-20T00:00:00","dual_lived":1,"version":"2.166","perl_release":"5.025008"},{"date":"2017-01-20T00:00:00","dual_lived":1,"version":"2.167","perl_release":"5.025009"},{"dual_lived":1,"version":"2.169","perl_release":"5.027007","date":"2017-12-20T00:00:00"},{"version":"2.170","dual_lived":1,"perl_release":"5.027008","date":"2018-01-20T00:00:00"},{"date":"2018-08-20T00:00:00","perl_release":"5.029002","version":"2.171","dual_lived":1},{"date":"2019-04-20T00:00:00","perl_release":"5.02901","dual_lived":1,"version":"2.174"},{"perl_release":"5.032001","version":"2.174_01","dual_lived":1,"date":"2021-01-23T00:00:00"},{"date":"2020-08-20T00:00:00","dual_lived":1,"version":"2.175","perl_release":"5.033001"},{"date":"2020-10-20T00:00:00","dual_lived":1,"version":"2.176","perl_release":"5.033003"},{"perl_release":"5.033008","dual_lived":1,"version":"2.177","date":"2021-03-20T00:00:00"},{"date":"2021-04-20T00:00:00","version":"2.178","dual_lived":1,"perl_release":"5.033009"},{"version":"2.179","dual_lived":1,"perl_release":"5.034","date":"2021-05-20T00:00:00"},{"date":"2022-01-20T00:00:00","version":"2.184","dual_lived":1,"perl_release":"5.035008"},{"date":"2022-06-20T00:00:00","perl_release":"5.037001","version":"2.185","dual_lived":1},{"date":"2022-07-20T00:00:00","perl_release":"5.037002","dual_lived":1,"version":"2.186"},{"version":"2.187","dual_lived":1,"perl_release":"5.037006","date":"2022-11-20T00:00:00"},{"dual_lived":1,"version":"2.188","perl_release":"5.037010","date":"2023-03-20T00:00:00"},{"date":"2023-09-20T00:00:00","dual_lived":1,"version":"2.189","perl_release":"5.039003"}],"main_module":"Data::Dumper"},"Net-IPv4Addr":{"advisories":[{"id":"CPANSA-Net-IPV4Addr-2021-47155","reported":"2024-03-18","fixed_versions":[],"cves":["CVE-2021-47155"],"distribution":"Net-IPv4Addr","description":"The Net::IPAddress::Util module before 5.000 for Perl does not properly consider extraneous zero characters in an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.\n","severity":null,"affected_versions":[">=0.10"],"references":["https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/","https://metacpan.org/release/Net-IPAddress-Util","https://metacpan.org/release/PWBENNETT/Net-IPAddress-Util-5.000/changes"]}],"versions":[{"version":"0.07","date":"1999-10-20T01:18:13"},{"date":"1999-12-17T23:08:34","version":"0.08"},{"date":"1999-12-17T23:10:21","version":"0.8"},{"date":"2000-05-03T20:24:59","version":"0.09"},{"date":"2000-08-07T19:39:33","version":"0.10"}],"main_module":"Net::IPv4Addr"},"SVG-Sparkline":{"advisories":[{"id":"CPANSA-SVG-Sparkline-2017-01","description":"Invalid data input validation makes it possible to pass arbitrary strings to module loading eval.\n","distribution":"SVG-Sparkline","reported":"2017-05-15","fixed_versions":[">=1.12"],"cves":[],"affected_versions":["<1.12"],"references":["https://metacpan.org/changes/distribution/SVG-Sparkline","https://github.com/gwadej/svg-sparkline/commit/ca83d6eb56aa86f3ca735866ffa9aa97acc2e708"]}],"main_module":"SVG::Sparkline","versions":[{"date":"2009-04-02T02:42:59","version":"0.1.0"},{"version":"0.1.1","date":"2009-04-03T01:30:19"},{"date":"2009-04-05T21:43:08","version":"0.2.0"},{"date":"2009-04-18T04:46:33","version":"0.2.5"},{"version":"0.2.6","date":"2009-04-21T00:31:44"},{"date":"2009-04-27T03:42:24","version":"0.2.7"},{"date":"2009-05-06T23:20:05","version":"0.3"},{"version":"0.31","date":"2009-05-07T22:11:10"},{"version":"0.32","date":"2009-10-19T04:12:52"},{"date":"2009-10-21T00:27:30","version":"0.33"},{"date":"2010-05-01T04:50:06","version":"0.34"},{"date":"2010-10-30T22:01:18","version":"0.35"},{"version":"0.36","date":"2012-09-04T00:09:32"},{"version":"1","date":"2013-10-24T14:01:00"},{"date":"2014-09-04T02:01:54","version":"1.1"},{"date":"2015-03-03T19:38:44","version":"1.11"},{"version":"1.12","date":"2017-05-15T01:32:51"}]},"Email-Address":{"advisories":[{"id":"CPANSA-Email-Address-2014-01","distribution":"Email-Address","description":"Inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via an empty quoted string in an RFC 2822 address.\n","reported":"2014-07-03","fixed_versions":[">=1.905"],"cves":["CVE-2014-0477"],"references":["https://metacpan.org/changes/distribution/Email-Address"],"affected_versions":["<1.905"]},{"id":"CPANSA-Email-Address-2014-01","cves":["CVE-2018-12558"],"reported":"2018-06-19","fixed_versions":[">=1.909"],"distribution":"Email-Address","description":"The parse() method in the Email::Address module through 1.909 for Perl is vulnerable to Algorithmic complexity on specially prepared input, leading to Denial of Service. Prepared special input that caused this problem contained 30 form-field characters (\"\\f\").\n","affected_versions":["<1.909"],"references":["https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901873","http://www.openwall.com/lists/oss-security/2018/06/19/3","http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00012.html"]},{"affected_versions":["<1.904"],"references":["https://github.com/rjbs/Email-Address/blob/master/Changes","http://seclists.org/oss-sec/2014/q2/563"],"severity":null,"reported":"2014-07-06","fixed_versions":[">=1.904"],"cves":["CVE-2014-4720"],"distribution":"Email-Address","description":"Email::Address module before 1.904 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via vectors related to \"backtracking into the phrase,\" a different vulnerability than CVE-2014-0477.\n","id":"CPANSA-Email-Address-2014-4720"}],"versions":[{"version":"1.1","date":"2004-05-27T03:19:56"},{"version":"1.2","date":"2004-06-02T16:35:30"},{"version":"1.3","date":"2004-08-16T21:39:58"},{"version":"1.5","date":"2004-10-05T18:10:42"},{"date":"2004-10-05T18:20:42","version":"1.6"},{"date":"2004-10-13T10:21:17","version":"1.7"},{"version":"1.80","date":"2004-10-22T16:37:27"},{"date":"2006-07-11T15:04:28","version":"1.85"},{"version":"1.86","date":"2006-07-22T00:42:17"},{"date":"2006-08-10T16:48:44","version":"1.870"},{"version":"1.861","date":"2006-10-12T19:35:04"},{"date":"2006-10-12T22:16:28","version":"1.871"},{"version":"1.880","date":"2006-11-11T16:01:38"},{"date":"2006-11-19T21:19:02","version":"1.881"},{"version":"1.882","date":"2006-11-22T01:26:44"},{"date":"2006-11-25T13:53:46","version":"1.883"},{"date":"2006-12-05T03:41:39","version":"1.884"},{"date":"2007-03-01T01:08:16","version":"1.885"},{"date":"2007-03-01T20:18:53","version":"1.886"},{"version":"1.887","date":"2007-04-01T19:15:49"},{"date":"2007-06-23T01:27:24","version":"1.888"},{"version":"1.889","date":"2007-12-19T22:14:37"},{"date":"2010-08-22T19:03:33","version":"1.890"},{"date":"2010-08-31T00:56:53","version":"1.891"},{"version":"1.892","date":"2010-09-03T23:45:13"},{"date":"2012-01-03T03:55:12","version":"1.893"},{"date":"2012-01-14T16:17:56","version":"1.894"},{"version":"1.895","date":"2012-01-15T18:41:33"},{"version":"1.896","date":"2012-08-01T03:07:33"},{"version":"1.897","date":"2012-12-17T15:16:33"},{"version":"1.898","date":"2013-02-07T21:41:48"},{"version":"1.899","date":"2013-08-02T14:54:13"},{"version":"1.900","date":"2013-08-08T18:46:07"},{"version":"1.901","date":"2014-01-29T03:43:28"},{"date":"2014-04-17T15:19:31","version":"1.902"},{"date":"2014-04-18T01:07:10","version":"1.903"},{"version":"1.904","date":"2014-06-14T04:22:22"},{"date":"2014-06-18T02:55:59","version":"1.905"},{"version":"1.906","date":"2015-02-03T21:49:39"},{"version":"1.907","date":"2015-02-03T22:48:46"},{"version":"1.908","date":"2015-09-20T02:55:12"},{"version":"1.909","date":"2018-03-05T03:26:56"},{"date":"2018-12-18T02:29:23","version":"1.910"},{"version":"1.911","date":"2018-12-22T16:31:37"},{"version":"1.912","date":"2018-12-31T19:51:36"},{"version":"1.913","date":"2023-01-10T00:42:33"}],"main_module":"Email::Address"},"Plack-Middleware-Statsd":{"versions":[{"date":"2018-01-31T18:15:11","version":"v0.1.0"},{"version":"v0.1.1","date":"2018-02-01T14:21:59"},{"version":"v0.2.0","date":"2018-02-01T17:21:50"},{"date":"2018-02-05T14:17:24","version":"v0.2.1"},{"version":"v0.3.0","date":"2018-02-06T11:11:05"},{"version":"v0.3.1","date":"2018-02-10T23:24:24"},{"date":"2018-02-10T23:37:02","version":"v0.3.2"},{"version":"v0.3.3","date":"2018-02-13T15:25:33"},{"version":"v0.3.4","date":"2018-03-01T15:40:24"},{"version":"v0.3.5","date":"2018-05-31T20:20:12"},{"version":"v0.3.6","date":"2018-10-16T21:39:35"},{"version":"v0.3.7","date":"2018-10-19T15:07:45"},{"date":"2018-11-30T01:31:20","version":"v0.3.8"},{"version":"v0.3.9","date":"2018-11-30T16:00:44"},{"version":"v0.3.10","date":"2019-12-18T23:46:32"},{"date":"2020-03-21T00:25:26","version":"v0.4.0"},{"date":"2020-03-21T17:16:50","version":"v0.4.1"},{"version":"v0.4.2","date":"2020-03-21T18:28:58"},{"version":"v0.4.3","date":"2020-03-23T09:00:09"},{"date":"2020-04-30T13:05:15","version":"v0.4.4"},{"version":"v0.4.5","date":"2020-05-11T17:29:43"},{"version":"v0.4.6","date":"2021-04-21T15:52:11"},{"version":"v0.4.7","date":"2021-04-27T15:48:15"},{"date":"2021-06-15T16:04:11","version":"v0.5.0"},{"version":"v0.5.1","date":"2021-07-03T13:09:16"},{"date":"2022-07-26T15:50:57","version":"v0.6.0"},{"version":"v0.6.1","date":"2022-09-02T15:06:07"},{"version":"v0.6.2","date":"2022-12-11T16:07:55"},{"version":"v0.6.3","date":"2023-06-15T18:46:16"},{"date":"2024-07-13T11:52:52","version":"v0.7.0"},{"date":"2024-07-20T11:53:49","version":"v0.7.1"},{"date":"2025-05-13T12:08:27","version":"v0.8.0"}],"main_module":"Plack::Middleware::Statsd","advisories":[{"references":["https://github.com/robrwo/Plack-Middleware-Statsd/security/advisories/GHSA-m5mc-hhfv-6rjf","https://github.com/briandfoy/cpan-security-advisory/issues/198","https://metacpan.org/dist/Plack-Middleware-Statsd/changes"],"affected_versions":["<0.8.0"],"severity":null,"description":"Stats for request methods are only counted for ASCII words, anything else is counted as 'other'. Stats for content types are only counted for well-formed types.","distribution":"Plack-Middleware-Statsd","cves":[],"reported":"2025-05-13","fixed_versions":[">=0.8.0"],"id":"CPANSA-Plack-Middleware-Statsd-2025-001"}]},"Dancer2":{"main_module":"Dancer2","versions":[{"version":"0.01","date":"2013-02-22T15:39:46"},{"date":"2013-02-24T11:04:25","version":"0.02"},{"date":"2013-03-07T17:30:37","version":"0.03"},{"date":"2013-04-22T19:58:02","version":"0.04"},{"date":"2013-07-20T16:53:37","version":"0.05"},{"version":"0.06","date":"2013-07-30T14:29:42"},{"date":"2013-08-03T22:17:54","version":"0.07"},{"date":"2013-08-18T12:24:31","version":"0.08"},{"version":"0.09","date":"2013-09-01T21:19:26"},{"version":"0.10","date":"2013-09-28T13:29:35"},{"date":"2013-12-15T13:21:28","version":"0.11"},{"date":"2014-04-07T21:05:16","version":"0.12"},{"version":"0.13","date":"2014-04-13T17:20:22"},{"version":"0.140000","date":"2014-04-28T21:16:57"},{"version":"0.140001","date":"2014-05-01T08:50:43"},{"date":"2014-06-07T20:35:57","version":"0.140900_01"},{"date":"2014-06-08T20:29:28","version":"0.141000"},{"version":"0.142000","date":"2014-06-24T19:18:07"},{"date":"2014-07-05T19:43:17","version":"0.143000"},{"date":"2014-07-23T19:34:51","version":"0.149000_01"},{"date":"2014-08-10T11:53:37","version":"0.149000_02"},{"version":"0.150000","date":"2014-08-16T23:38:39"},{"version":"0.151000","date":"2014-10-08T19:51:49"},{"version":"0.152000","date":"2014-10-14T02:33:06"},{"version":"0.153000","date":"2014-10-23T21:48:36"},{"version":"0.153001","date":"2014-10-29T21:41:13"},{"date":"2014-10-30T08:29:15","version":"0.153002"},{"version":"0.154000","date":"2014-11-17T14:41:14"},{"version":"0.155000","date":"2014-11-28T00:21:55"},{"date":"2014-11-28T16:44:27","version":"0.155001"},{"date":"2014-12-02T22:02:03","version":"0.155002"},{"version":"0.155003","date":"2014-12-03T21:35:35"},{"version":"0.155004","date":"2014-12-04T10:57:08"},{"version":"0.156000","date":"2014-12-07T17:07:21"},{"version":"0.156001","date":"2014-12-08T22:08:30"},{"date":"2014-12-14T17:25:53","version":"0.157000"},{"date":"2014-12-21T19:42:24","version":"0.157001"},{"date":"2015-01-01T17:11:48","version":"0.158000"},{"version":"0.159000","date":"2015-02-24T03:54:24"},{"version":"0.159001","date":"2015-02-25T14:33:59"},{"version":"0.159002","date":"2015-03-03T18:25:28"},{"version":"0.159003","date":"2015-03-23T14:00:19"},{"date":"2015-04-26T22:15:22","version":"0.160000"},{"date":"2015-05-14T18:46:02","version":"0.160001"},{"date":"2015-06-04T11:07:02","version":"0.160002"},{"date":"2015-06-06T09:11:43","version":"0.160003"},{"date":"2015-07-08T13:04:02","version":"0.161000"},{"date":"2015-08-28T13:32:02","version":"0.161000_01"},{"version":"0.162000","date":"2015-09-06T11:13:10"},{"version":"0.162000_01","date":"2015-10-13T15:08:16"},{"version":"0.163000","date":"2015-10-15T11:00:10"},{"date":"2015-12-16T22:44:32","version":"0.164000"},{"date":"2015-12-17T08:23:24","version":"0.165000"},{"version":"0.166000","date":"2016-01-12T18:04:57"},{"date":"2016-01-22T06:57:11","version":"0.166001"},{"version":"0.166001_01","date":"2016-04-19T19:52:27"},{"date":"2016-04-29T14:45:41","version":"0.166001_02"},{"version":"0.166001_03","date":"2016-05-27T11:25:55"},{"version":"0.166001_04","date":"2016-05-27T12:57:04"},{"date":"2016-05-31T13:29:37","version":"0.200000"},{"version":"0.200001","date":"2016-06-16T14:00:23"},{"date":"2016-06-22T14:41:29","version":"0.200002"},{"date":"2016-07-05T19:36:46","version":"0.200003"},{"version":"0.200003","date":"2016-07-11T15:21:33"},{"date":"2016-07-22T04:41:26","version":"0.200004"},{"version":"0.201000","date":"2016-07-22T13:28:45"},{"version":"0.202000","date":"2016-08-13T18:53:07"},{"version":"0.203000","date":"2016-08-25T03:12:19"},{"date":"2016-09-04T02:01:29","version":"0.203001"},{"version":"0.204000","date":"2016-10-11T01:59:49"},{"date":"2016-10-17T13:32:25","version":"0.204001"},{"date":"2016-12-21T21:47:24","version":"0.204002"},{"version":"0.204003","date":"2017-01-25T21:23:22"},{"date":"2017-01-26T17:31:30","version":"0.204004"},{"version":"0.205000","date":"2017-03-10T21:40:43"},{"date":"2017-07-11T13:04:56","version":"0.205001"},{"version":"0.205002","date":"2017-10-17T21:10:03"},{"version":"0.206000_01","date":"2018-04-09T00:54:25"},{"date":"2018-04-10T01:50:18","version":"0.206000_02"},{"version":"0.206000","date":"2018-04-20T02:12:22"},{"version":"0.207000","date":"2018-11-14T22:26:15"},{"date":"2019-06-19T14:23:06","version":"0.208000"},{"date":"2019-08-05T01:12:14","version":"0.208001"},{"date":"2019-12-14T21:13:32","version":"0.208002"},{"version":"0.300000","date":"2019-12-24T05:57:09"},{"version":"0.300001","date":"2020-04-06T16:18:33"},{"version":"0.300002","date":"2020-04-07T15:49:22"},{"version":"0.300003","date":"2020-04-09T14:42:55"},{"version":"0.300004","date":"2020-05-27T00:54:55"},{"date":"2021-01-26T20:59:33","version":"0.300005"},{"version":"0.301000","date":"2021-03-15T23:12:49"},{"date":"2021-03-17T12:56:09","version":"0.301001"},{"version":"0.301002","date":"2021-04-18T19:33:05"},{"version":"0.301003","date":"2021-06-03T13:29:26"},{"date":"2021-06-06T17:32:08","version":"0.301004"},{"date":"2022-03-14T02:18:12","version":"0.400000"},{"date":"2023-02-05T23:42:54","version":"0.400001"},{"date":"2023-10-09T14:11:25","version":"1.0.0"},{"date":"2023-12-12T01:29:05","version":"1.1.0"},{"version":"1.1.1","date":"2024-07-18T23:49:14"},{"version":"1.1.2","date":"2024-11-25T13:36:09"}],"advisories":[{"severity":"critical","affected_versions":["<0.206000"],"references":["https://metacpan.org/changes/distribution/Dancer2","http://lists.preshweb.co.uk/pipermail/dancer-users/2018-April/005952.html","https://github.com/PerlDancer/Dancer2/commit/3580f5d0874a9abf5483528f73bda9a7fd9ec7f1"],"id":"CPANSA-Dancer2-2018-01","reported":"2018-01-30","fixed_versions":[">=0.206000"],"cves":[],"distribution":"Dancer2","description":"There is a potential RCE with regards to Storable. We have added session ID validation to the session engine so that session backends based on Storable can reject malformed session IDs that may lead to exploitation of the RCE.\n"}]},"IO-Socket-SSL":{"main_module":"IO::Socket::SSL","versions":[{"version":"0.70","date":"1999-06-18T14:54:49"},{"version":"0.72","date":"1999-07-21T19:45:05"},{"date":"1999-07-29T17:28:04","version":"0.73"},{"version":"0.74","date":"2000-07-04T11:46:51"},{"date":"2000-08-08T06:59:10","version":"0.75"},{"version":"0.76","date":"2000-11-17T14:26:45"},{"date":"2001-01-15T13:57:06","version":"0.77"},{"version":"0.78","date":"2001-04-24T07:00:38"},{"version":"0.79","date":"2001-06-04T08:01:01"},{"date":"2001-08-19T08:28:53","version":"0.80"},{"version":"0.81","date":"2002-04-10T12:43:43"},{"date":"2002-08-13T21:42:55","version":"0.90"},{"version":"0.901","date":"2002-08-19T15:28:09"},{"version":"0.91","date":"2002-09-01T01:13:14"},{"version":"0.92","date":"2002-10-22T06:15:30"},{"version":"0.93","date":"2003-06-24T19:24:37"},{"date":"2003-06-26T19:41:04","version":"0.94"},{"version":"0.95","date":"2003-08-25T22:47:30"},{"date":"2004-04-30T17:43:07","version":"0.96"},{"version":"0.97","date":"2005-07-17T09:20:02"},{"version":"0.98","date":"2006-06-12T14:37:33"},{"date":"2006-06-12T14:48:30","version":"0.98"},{"date":"2006-07-17T15:05:06","version":"0.99"},{"date":"2006-07-18T13:33:27","version":"0.99"},{"date":"2006-07-20T05:59:15","version":"0.99"},{"version":"0.99","date":"2006-07-20T08:35:45"},{"date":"2006-07-24T14:27:43","version":"0.99"},{"version":"0.99","date":"2006-08-02T07:30:04"},{"version":"0.99","date":"2006-08-02T07:37:59"},{"date":"2006-08-02T20:43:25","version":"0.99"},{"date":"2006-08-11T10:01:10","version":"0.99"},{"date":"2006-08-15T20:22:28","version":"0.99"},{"version":"0.99","date":"2006-09-12T14:16:38"},{"version":"0.99","date":"2006-09-13T11:10:06"},{"date":"2006-12-01T09:57:52","version":"0.99"},{"version":"0.99","date":"2007-03-06T18:12:09"},{"date":"2007-03-28T19:06:21","version":"0.99"},{"date":"2007-04-16T19:35:58","version":"0.99"},{"version":"0.99","date":"2007-04-30T07:45:00"},{"version":"0.99","date":"2007-06-03T19:46:51"},{"version":"0.99","date":"2007-06-06T13:59:06"},{"date":"2007-08-10T09:07:39","version":"0.99"},{"version":"0.99","date":"2007-09-13T19:40:43"},{"date":"2007-10-09T21:18:11","version":"0.99"},{"date":"2007-10-10T18:49:29","version":"0.99"},{"version":"0.99","date":"2007-10-26T06:29:26"},{"version":"0.99","date":"2008-01-11T17:59:06"},{"date":"2008-01-28T06:44:08","version":"0.99"},{"version":"0.99","date":"2008-02-22T09:07:12"},{"date":"2008-02-24T09:42:37","version":"0.99"},{"version":"0.99","date":"2008-02-25T21:18:02"},{"date":"2008-03-10T08:46:06","version":"0.99"},{"version":"0.99","date":"2008-07-16T09:27:07"},{"date":"2008-08-28T20:03:28","version":"0.99"},{"version":"0.99","date":"2008-09-19T06:34:13"},{"version":"0.99","date":"2008-09-19T16:54:30"},{"version":"0.99","date":"2008-09-24T07:52:48"},{"version":"0.99","date":"2008-09-25T09:24:39"},{"version":"0.99","date":"2008-10-13T09:06:13"},{"date":"2008-11-17T17:21:39","version":"0.99"},{"date":"2008-12-31T14:47:59","version":"0.99"},{"date":"2009-01-15T20:52:54","version":"0.99"},{"version":"0.99","date":"2009-01-22T20:59:47"},{"date":"2009-01-24T06:34:00","version":"0.99"},{"date":"2009-02-23T09:59:39","version":"1.23"},{"date":"2009-04-01T08:02:14","version":"1.24"},{"date":"2009-07-02T18:15:35","version":"1.25"},{"version":"1.26","date":"2009-07-03T07:36:23"},{"version":"1.27","date":"2009-07-24T06:37:32"},{"version":"1.28","date":"2009-08-19T10:46:35"},{"version":"1.29","date":"2009-08-19T10:54:30"},{"version":"1.30","date":"2009-08-19T14:41:37"},{"date":"2009-09-01T07:44:10","version":"1.30_2"},{"version":"1.30_3","date":"2009-09-02T05:57:30"},{"version":"1.31","date":"2009-09-25T19:10:53"},{"version":"1.32","date":"2010-02-22T09:39:43"},{"version":"1.33","date":"2010-03-17T12:53:27"},{"version":"1.34","date":"2010-11-01T08:55:36"},{"date":"2010-12-06T08:16:23","version":"1.35"},{"version":"1.36","date":"2010-12-08T19:28:31"},{"date":"2010-12-09T08:38:47","version":"1.37"},{"version":"1.38","date":"2011-01-18T08:45:03"},{"version":"1.39","date":"2011-03-03T11:39:29"},{"date":"2011-05-02T10:32:52","version":"1.40"},{"version":"1.41","date":"2011-05-10T05:14:22"},{"version":"1.42","date":"2011-05-10T14:15:57"},{"version":"1.43","date":"2011-05-11T08:23:15"},{"version":"1.43_1","date":"2011-05-12T19:35:25"},{"date":"2011-05-27T11:46:14","version":"1.44"},{"date":"2011-10-13T08:42:32","version":"1.45"},{"date":"2011-10-18T06:30:07","version":"1.46"},{"version":"1.47","date":"2011-10-21T07:09:03"},{"version":"1.48","date":"2011-10-26T16:35:42"},{"version":"1.49","date":"2011-10-28T08:26:49"},{"version":"1.50","date":"2011-12-06T21:14:17"},{"date":"2011-12-06T21:25:05","version":"1.51"},{"date":"2011-12-07T08:12:01","version":"1.52"},{"date":"2011-12-11T21:45:13","version":"1.53"},{"version":"1.54","date":"2012-01-11T08:15:23"},{"version":"1.55","date":"2012-02-20T06:49:04"},{"date":"2012-02-22T15:49:39","version":"1.56"},{"date":"2012-02-26T21:57:54","version":"1.57"},{"date":"2012-02-26T22:09:30","version":"1.58"},{"version":"1.59","date":"2012-03-08T10:44:05"},{"version":"1.60","date":"2012-03-20T18:59:41"},{"version":"1.61","date":"2012-03-27T14:34:36"},{"date":"2012-03-28T05:53:19","version":"1.62"},{"date":"2012-04-06T20:33:58","version":"1.63"},{"version":"1.64","date":"2012-04-06T21:04:54"},{"version":"1.65","date":"2012-04-16T16:51:54"},{"version":"1.66","date":"2012-04-16T18:52:52"},{"date":"2012-05-07T09:39:11","version":"1.67"},{"version":"1.68","date":"2012-05-07T13:01:38"},{"version":"1.69","date":"2012-05-08T08:24:35"},{"version":"1.70","date":"2012-05-08T09:18:24"},{"date":"2012-05-09T08:41:48","version":"1.71"},{"date":"2012-05-10T11:10:15","version":"1.72"},{"date":"2012-05-11T19:29:42","version":"1.73"},{"version":"1.74","date":"2012-05-13T15:19:26"},{"version":"1.74_1","date":"2012-06-07T17:42:47"},{"version":"1.74_2","date":"2012-06-07T21:59:28"},{"date":"2012-06-15T12:42:21","version":"1.75"},{"version":"1.76","date":"2012-06-18T06:20:09"},{"date":"2012-10-05T05:36:56","version":"1.77"},{"version":"1.78","date":"2012-11-25T14:08:27"},{"version":"1.79","date":"2012-11-25T15:50:09"},{"version":"1.80","date":"2012-11-30T07:47:23"},{"date":"2012-12-06T09:14:04","version":"1.81"},{"version":"1.82","date":"2013-01-28T07:41:50"},{"version":"1.83","date":"2013-02-03T19:04:27"},{"version":"1.831","date":"2013-02-14T08:05:20"},{"date":"2013-02-15T20:48:12","version":"1.84"},{"date":"2013-04-14T08:59:30","version":"1.85"},{"date":"2013-04-17T11:31:18","version":"1.86"},{"version":"1.87","date":"2013-04-24T18:16:01"},{"date":"2013-05-02T05:59:47","version":"1.88"},{"date":"2013-05-14T13:36:49","version":"1.89"},{"date":"2013-05-29T18:58:35","version":"1.90"},{"version":"1.91","date":"2013-05-30T09:36:07"},{"date":"2013-05-30T19:20:11","version":"1.92"},{"date":"2013-05-31T06:14:58","version":"1.93"},{"date":"2013-06-01T12:46:14","version":"1.94"},{"version":"1.950","date":"2013-07-03T08:44:53"},{"date":"2013-07-03T10:02:42","version":"1.951"},{"version":"1.952","date":"2013-07-11T20:14:18"},{"version":"1.953","date":"2013-07-22T06:34:31"},{"version":"1.954","date":"2013-09-15T13:05:33"},{"date":"2013-10-11T16:54:45","version":"1.955"},{"date":"2013-11-10T18:00:08","version":"1.956"},{"version":"1.957","date":"2013-11-11T08:42:30"},{"date":"2013-11-11T18:28:16","version":"1.958"},{"version":"1.959","date":"2013-11-12T15:39:42"},{"date":"2013-11-13T00:10:43","version":"1.960"},{"version":"1.961","date":"2013-11-26T14:47:11"},{"version":"1.962","date":"2013-11-27T21:19:25"},{"date":"2014-01-13T13:05:48","version":"1.963"},{"version":"1.964","date":"2014-01-15T11:36:49"},{"version":"1.965","date":"2014-01-16T19:11:32"},{"version":"1.966","date":"2014-01-21T16:53:39"},{"date":"2014-02-06T22:06:14","version":"1.967"},{"version":"1.968","date":"2014-03-13T06:38:27"},{"version":"1.969","date":"2014-03-16T16:41:39"},{"version":"1.970","date":"2014-03-19T05:04:51"},{"version":"1.971","date":"2014-03-22T19:54:06"},{"version":"1.972","date":"2014-03-23T06:48:23"},{"date":"2014-03-26T07:10:22","version":"1.973"},{"date":"2014-04-02T06:53:53","version":"1.974"},{"version":"1.975","date":"2014-04-02T10:14:38"},{"date":"2014-04-04T04:36:04","version":"1.976"},{"date":"2014-04-04T13:25:28","version":"1.977"},{"version":"1.978","date":"2014-04-04T14:21:32"},{"date":"2014-04-06T06:24:29","version":"1.979"},{"version":"1.980","date":"2014-04-08T01:25:10"},{"date":"2014-04-08T11:09:59","version":"1.981"},{"version":"1.982","date":"2014-04-24T20:14:47"},{"version":"1.982_1","date":"2014-04-27T12:02:16"},{"date":"2014-05-04T08:03:37","version":"1.983"},{"date":"2014-05-10T13:11:17","version":"1.984"},{"date":"2014-05-15T06:30:28","version":"1.985"},{"date":"2014-05-16T17:41:46","version":"1.986"},{"version":"1.987","date":"2014-05-17T15:03:37"},{"version":"1.988","date":"2014-05-17T22:15:10"},{"date":"2014-05-24T08:16:00","version":"1.989"},{"version":"1.989_1","date":"2014-05-26T05:46:04"},{"date":"2014-05-27T11:00:11","version":"1.990"},{"date":"2014-05-27T19:43:31","version":"1.991"},{"date":"2014-06-01T21:47:49","version":"1.992"},{"date":"2014-06-13T20:45:52","version":"1.993"},{"date":"2014-06-22T09:53:11","version":"1.994"},{"version":"1.995","date":"2014-07-11T21:50:48"},{"date":"2014-07-12T11:49:12","version":"1.996"},{"version":"1.997","date":"2014-07-12T17:24:04"},{"version":"1.998","date":"2014-09-07T14:59:47"},{"version":"1.999","date":"2014-10-09T19:56:19"},{"version":"2.000","date":"2014-10-16T05:05:11"},{"version":"2.001","date":"2014-10-21T09:46:39"},{"version":"2.002","date":"2014-10-21T21:00:54"},{"date":"2014-11-14T20:12:08","version":"2.003"},{"date":"2014-11-15T10:05:06","version":"2.004"},{"date":"2014-11-15T10:14:17","version":"2.004_1"},{"version":"2.005","date":"2014-11-15T16:29:13"},{"date":"2014-11-15T16:34:37","version":"2.005_1"},{"version":"2.006","date":"2014-11-22T20:51:08"},{"version":"2.007","date":"2014-11-26T22:00:05"},{"date":"2014-12-16T06:36:16","version":"2.008"},{"date":"2015-01-12T10:48:21","version":"2.009"},{"version":"2.010","date":"2015-01-14T20:13:41"},{"version":"2.011","date":"2015-02-01T16:00:22"},{"date":"2015-02-02T07:46:57","version":"2.012"},{"date":"2015-05-01T15:39:14","version":"2.013"},{"version":"2.014","date":"2015-05-05T06:31:37"},{"version":"2.015","date":"2015-05-13T20:43:55"},{"date":"2015-05-26T21:15:38","version":"2.015_001"},{"date":"2015-05-27T05:39:14","version":"2.015_002"},{"version":"2.015_003","date":"2015-05-27T17:24:09"},{"version":"2.015_004","date":"2015-05-28T07:07:25"},{"date":"2015-05-29T06:01:37","version":"2.015_005"},{"version":"2.015_006","date":"2015-06-02T19:35:20"},{"date":"2015-06-02T20:41:45","version":"2.016"},{"version":"2.016_001","date":"2015-06-04T14:38:29"},{"version":"2.016_002","date":"2015-06-14T17:05:06"},{"version":"2.017","date":"2015-08-24T15:45:30"},{"version":"2.018","date":"2015-08-27T11:31:55"},{"date":"2015-09-01T05:32:47","version":"2.019"},{"date":"2015-09-20T10:33:59","version":"2.020"},{"version":"2.021","date":"2015-12-02T19:55:29"},{"date":"2015-12-10T07:12:46","version":"2.022"},{"date":"2016-01-30T11:12:14","version":"2.023"},{"date":"2016-02-06T19:38:18","version":"2.024"},{"version":"2.025","date":"2016-04-04T07:23:02"},{"date":"2016-04-20T06:11:37","version":"2.026"},{"version":"2.027","date":"2016-04-20T14:22:50"},{"version":"2.028","date":"2016-06-27T14:22:02"},{"date":"2016-06-27T15:53:16","version":"2.029"},{"date":"2016-07-08T08:53:04","version":"2.030"},{"version":"2.031","date":"2016-07-08T11:40:31"},{"version":"2.032","date":"2016-07-12T13:12:57"},{"version":"2.033","date":"2016-07-15T09:00:38"},{"date":"2016-08-08T08:19:05","version":"2.034"},{"version":"2.035","date":"2016-08-11T14:25:18"},{"date":"2016-08-11T19:03:38","version":"2.036"},{"date":"2016-08-22T17:39:32","version":"2.037"},{"date":"2016-09-17T09:36:29","version":"2.038"},{"version":"2.039","date":"2016-11-20T21:01:59"},{"date":"2016-12-17T15:18:35","version":"2.040"},{"date":"2017-01-04T05:17:55","version":"2.041"},{"version":"2.042","date":"2017-01-05T18:32:13"},{"version":"2.043","date":"2017-01-06T13:27:56"},{"date":"2017-01-26T10:46:57","version":"2.044"},{"version":"2.045","date":"2017-02-13T15:26:59"},{"version":"2.046","date":"2017-02-15T18:41:05"},{"version":"2.047","date":"2017-02-16T19:01:01"},{"version":"2.048","date":"2017-04-16T18:33:09"},{"version":"2.049","date":"2017-06-12T05:15:34"},{"date":"2017-08-18T06:07:18","version":"2.050"},{"version":"2.051","date":"2017-09-05T09:28:25"},{"version":"2.052","date":"2017-10-22T08:48:29"},{"date":"2018-01-21T19:41:38","version":"2.053"},{"version":"2.054","date":"2018-01-22T05:11:45"},{"date":"2018-02-15T13:45:54","version":"2.055"},{"version":"2.056","date":"2018-02-19T06:35:28"},{"date":"2018-07-18T19:16:28","version":"2.057"},{"version":"2.058","date":"2018-07-19T07:54:24"},{"date":"2018-08-15T16:13:05","version":"2.059"},{"version":"2.060","date":"2018-09-16T19:15:07"},{"version":"2.061","date":"2019-02-23T02:08:16"},{"version":"2.062","date":"2019-02-24T00:14:55"},{"date":"2019-03-01T14:48:40","version":"2.063"},{"version":"2.064","date":"2019-03-04T12:28:12"},{"date":"2019-03-05T18:50:40","version":"2.065"},{"version":"2.066","date":"2019-03-06T06:55:56"},{"date":"2020-02-14T17:49:51","version":"2.067"},{"date":"2020-03-31T06:15:39","version":"2.068"},{"version":"2.069","date":"2021-01-22T16:55:49"},{"date":"2021-02-26T08:03:24","version":"2.070"},{"version":"2.071","date":"2021-05-23T08:12:02"},{"date":"2021-08-16T13:06:40","version":"2.072"},{"date":"2021-12-22T19:30:42","version":"2.073"},{"date":"2022-01-07T15:09:53","version":"2.074"},{"version":"2.075","date":"2022-09-02T18:18:33"},{"version":"2.076","date":"2022-11-14T13:41:15"},{"version":"2.077","date":"2022-11-21T11:44:16"},{"version":"2.078","date":"2022-12-11T20:10:13"},{"date":"2023-01-16T06:28:01","version":"2.079"},{"date":"2023-01-18T16:28:53","version":"2.080"},{"version":"2.081","date":"2023-01-25T10:49:10"},{"date":"2023-05-17T20:41:22","version":"2.082"},{"version":"2.083","date":"2023-05-18T09:15:20"},{"version":"2.084","date":"2023-11-06T21:02:36"},{"version":"2.085","date":"2024-01-22T19:07:08"},{"version":"2.086","date":"2024-07-03T12:14:36"},{"version":"2.087","date":"2024-07-08T05:33:53"},{"version":"2.088","date":"2024-07-14T05:05:54"},{"version":"2.089","date":"2024-08-29T14:46:00"}],"advisories":[{"references":["http://osvdb.org/69626","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606058","http://www.securityfocus.com/bid/45189","http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-1.35/Changes","http://secunia.com/advisories/42508","http://secunia.com/advisories/42757","http://www.openwall.com/lists/oss-security/2010/12/09/8","http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052594.html","http://www.openwall.com/lists/oss-security/2010/12/24/1","http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052601.html","http://www.mandriva.com/security/advisories?name=MDVSA-2011:092"],"affected_versions":["<=1.35"],"severity":null,"description":"The IO::Socket::SSL module 1.35 for Perl, when verify_mode is not VERIFY_NONE, fails open to VERIFY_NONE instead of throwing an error when a ca_file/ca_path cannot be verified, which allows remote attackers to bypass intended certificate restrictions.\n","distribution":"IO-Socket-SSL","reported":"2011-01-14","cves":["CVE-2010-4334"],"fixed_versions":[">1.35"],"id":"CPANSA-IO-Socket-SSL-2010-4334"},{"id":"CPANSA-IO-Socket-SSL-2009-3024","distribution":"IO-Socket-SSL","description":"The verify_hostname_of_cert function in the certificate checking feature in IO-Socket-SSL (IO::Socket::SSL) 1.14 through 1.25 only matches the prefix of a hostname when no wildcard is used, which allows remote attackers to bypass the hostname check for a certificate.\n","cves":["CVE-2009-3024"],"reported":"2009-08-31","fixed_versions":[">=1.26"],"severity":null,"affected_versions":[">=1.14","<=1.25"],"references":["http://www.openwall.com/lists/oss-security/2009/08/31/4","http://www.openwall.com/lists/oss-security/2009/08/28/1","http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-1.30/Changes","http://www.openwall.com/lists/oss-security/2009/08/29/1","http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html","http://www.vupen.com/english/advisories/2011/0118","http://www.gentoo.org/security/en/glsa/glsa-201101-06.xml","http://secunia.com/advisories/42893"]}]},"Apache-SessionX":{"advisories":[{"affected_versions":["<2.01"],"references":["https://metacpan.org/changes/distribution/Apache-SessionX"],"id":"CPANSA-Apache-SessionX-2005-01","reported":"2005-11-15","fixed_versions":[">=2.01"],"cves":[],"distribution":"Apache-SessionX","description":"Problem in session_id validation, which allows creation of session with invalid ids.\n"}],"versions":[{"version":"2.00","date":"2001-11-20T15:36:53"},{"version":"2.00","date":"2003-03-02T14:18:57"},{"date":"2005-11-15T05:21:49","version":"2.01"}],"main_module":"Apache::SessionX"},"Pod-Perldoc":{"advisories":[{"references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"affected_versions":["<3.26"],"severity":"high","description":"(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","distribution":"Pod-Perldoc","fixed_versions":[">=3.26"],"reported":"2016-08-02","cves":["CVE-2016-1238"],"id":"CPANSA-Pod-Perldoc-2016-1238"}],"main_module":"Pod::Perldoc","versions":[{"version":"3.04","date":"2002-11-11T10:33:54"},{"version":"3.05","date":"2002-11-12T05:04:50"},{"date":"2002-11-22T10:04:59","version":"3.06"},{"version":"3.07","date":"2002-12-02T05:24:12"},{"date":"2003-01-19T03:50:24","version":"3.08"},{"version":"3.09","date":"2003-07-24T14:38:18"},{"date":"2003-09-11T07:02:58","version":"3.10"},{"version":"3.11","date":"2003-10-12T23:01:05"},{"date":"2003-10-22T01:02:23","version":"3.12"},{"date":"2004-04-10T02:26:31","version":"3.13"},{"date":"2004-11-30T22:34:04","version":"3.14"},{"date":"2007-08-23T12:55:53","version":"3.14_01"},{"date":"2007-08-23T18:18:55","version":"3.14_02"},{"version":"3.14_03","date":"2007-09-04T13:39:37"},{"date":"2008-04-16T14:37:04","version":"3.14_04"},{"version":"3.14_05","date":"2008-04-22T18:26:25"},{"version":"3.14_06","date":"2008-05-03T00:43:47"},{"version":"3.14_07","date":"2008-05-08T14:33:08"},{"date":"2008-11-01T15:01:44","version":"3.15"},{"version":"3.15_01","date":"2009-09-30T17:29:52"},{"date":"2011-11-13T23:32:29","version":"3.15_08"},{"version":"3.15_09","date":"2011-11-14T19:38:57"},{"date":"2011-11-20T01:58:40","version":"3.15_10"},{"version":"3.15_11","date":"2011-11-29T19:10:49"},{"date":"2011-12-09T13:03:26","version":"3.15_12"},{"date":"2011-12-14T10:17:10","version":"3.15_13"},{"date":"2011-12-18T16:08:00","version":"3.15_14"},{"date":"2012-01-06T16:47:58","version":"3.15_15"},{"date":"2012-03-17T05:02:18","version":"3.16"},{"date":"2012-03-18T03:01:03","version":"3.17"},{"version":"3.18","date":"2013-01-28T04:11:09"},{"version":"3.19","date":"2013-01-28T04:33:05"},{"version":"3.19_01","date":"2013-01-29T02:56:49"},{"date":"2013-04-27T05:51:04","version":"3.20"},{"version":"3.21_01","date":"2013-11-19T17:18:23"},{"version":"3.21","date":"2014-01-06T02:28:01"},{"version":"3.22_01","date":"2014-01-31T05:43:36"},{"version":"3.22_02","date":"2014-02-05T05:17:44"},{"version":"3.23","date":"2014-02-23T19:09:39"},{"version":"3.23_01","date":"2014-08-16T16:52:05"},{"version":"3.24","date":"2014-08-19T03:49:18"},{"date":"2014-09-10T03:32:34","version":"3.24_01"},{"date":"2015-01-21T03:18:32","version":"3.24_02"},{"version":"3.25","date":"2015-02-12T03:13:45"},{"version":"3.25_02","date":"2016-01-12T14:43:09"},{"date":"2016-07-28T04:44:07","version":"3.26"},{"date":"2016-07-30T16:09:06","version":"3.26_01"},{"date":"2016-08-02T16:35:03","version":"3.26_02"},{"date":"2016-08-03T20:48:54","version":"3.27"},{"version":"3.27_01","date":"2016-10-16T02:46:57"},{"date":"2017-03-01T22:00:04","version":"3.27_02"},{"version":"3.28","date":"2017-03-16T01:14:07"},{"date":"2023-12-06T07:21:16","version":"3.28_01"},{"date":"2025-02-16T02:15:19","version":"3.29"},{"date":"2010-02-20T00:00:00","perl_release":"5.011005","version":"3.15_02","dual_lived":1},{"date":"2011-01-20T00:00:00","perl_release":"5.013009","dual_lived":1,"version":"3.15_03"},{"dual_lived":1,"version":"3.15_04","perl_release":"5.014001","date":"2011-06-16T00:00:00"},{"date":"2011-06-20T00:00:00","perl_release":"5.015000","dual_lived":1,"version":"3.15_05"},{"version":"3.15_06","dual_lived":1,"perl_release":"5.015001","date":"2011-07-20T00:00:00"},{"date":"2011-09-20T00:00:00","perl_release":"5.015003","dual_lived":1,"version":"3.15_07"},{"perl_release":"5.022003","dual_lived":1,"version":"3.25_01","date":"2017-01-14T00:00:00"},{"perl_release":"5.024001","dual_lived":1,"version":"3.25_03","date":"2017-01-14T00:00:00"},{"perl_release":"5.027005","dual_lived":1,"version":"3.2801","date":"2017-10-20T00:00:00"}]},"Perl-Version":{"main_module":"Perl::Version","versions":[{"date":"2007-02-07T19:41:42","version":"v0.0.1"},{"date":"2007-02-23T18:03:11","version":"v0.0.3"},{"date":"2007-02-24T18:03:42","version":"v0.0.4"},{"version":"v0.0.5","date":"2007-02-25T12:41:13"},{"date":"2007-02-27T12:46:07","version":"v0.0.6"},{"date":"2007-02-28T01:27:59","version":"v0.0.7"},{"date":"2007-06-20T16:09:31","version":"0.0.8"},{"version":"v1.000","date":"2007-09-03T14:28:35"},{"version":"v1.001","date":"2007-09-07T15:42:58"},{"version":"v1.002","date":"2007-09-07T15:58:18"},{"date":"2007-11-08T12:14:27","version":"1.003"},{"version":"1.004","date":"2007-11-08T12:24:59"},{"date":"2008-04-03T14:56:16","version":"1.005"},{"date":"2008-04-07T19:14:56","version":"1.006"},{"date":"2008-04-07T19:27:24","version":"1.007"},{"version":"1.008","date":"2009-03-07T16:40:03"},{"date":"2009-03-09T16:22:08","version":"1.009"},{"version":"1.010","date":"2010-09-19T15:37:48"},{"date":"2011-02-21T21:32:17","version":"1.011"},{"version":"1.013","date":"2014-02-12T20:58:43"},{"date":"2014-02-14T16:08:42","version":"1.013_01"},{"date":"2014-02-18T16:42:57","version":"1.013_02"},{"version":"1.013_03","date":"2015-11-21T06:05:48"},{"date":"2024-01-04T15:11:21","version":"1.015"},{"date":"2024-01-05T13:57:01","version":"1.016"},{"date":"2024-03-09T01:38:25","version":"1.017"},{"version":"1.018","date":"2025-01-27T13:08:16"}],"advisories":[{"affected_versions":["<1.013"],"references":["https://metacpan.org/changes/distribution/Perl-Version","https://rt.cpan.org/Public/Bug/Display.html?id=92974"],"distribution":"Perl-Version","description":"Insecure dependency File::Slurp is used.\n","fixed_versions":[">=1.013"],"reported":"2014-02-12","cves":[],"id":"CPANSA-Perl-Version-2014-01"}]},"CGI-Application-Plugin-AutoRunmode":{"advisories":[{"id":"CPANSA-CGI-Application-Plugin-AutoRunmode-2005-01","reported":"2005-03-04","cves":[],"fixed_versions":[">=0.04"],"description":"Non-word characters are allowed in runmode name.\n","distribution":"CGI-Application-Plugin-AutoRunmode","affected_versions":["<0.04"],"references":["https://metacpan.org/changes/distribution/CGI-Application-Plugin-AutoRunmode"]}],"versions":[{"version":"0.04","date":"2005-03-04T06:59:51"},{"date":"2005-03-10T07:22:55","version":"0.05"},{"version":"0.06","date":"2005-06-15T10:20:17"},{"version":"0.07","date":"2005-06-18T02:09:08"},{"date":"2005-07-17T00:49:10","version":"0.08"},{"date":"2005-09-22T12:31:22","version":"0.09"},{"version":"0.10","date":"2005-10-16T00:17:47"},{"version":"0.11","date":"2005-10-18T13:23:50"},{"date":"2005-11-03T01:10:37","version":"0.12"},{"version":"0.13","date":"2006-04-08T07:18:44"},{"version":"0.14","date":"2006-05-21T05:04:48"},{"date":"2006-12-17T07:46:24","version":"0.15"},{"version":"0.16","date":"2009-02-14T09:16:39"},{"version":"0.17","date":"2010-05-21T04:24:45"},{"date":"2011-02-18T09:23:15","version":"0.18"}],"main_module":"CGI::Application::Plugin::AutoRunmode"},"CBOR-XS":{"versions":[{"date":"2013-10-25T23:10:42","version":"0.01"},{"version":"0.02","date":"2013-10-26T11:09:56"},{"version":"0.03","date":"2013-10-26T23:04:01"},{"version":"0.04","date":"2013-10-27T22:48:22"},{"date":"2013-10-28T21:28:30","version":"0.05"},{"date":"2013-10-29T15:57:13","version":"0.06"},{"version":"0.07","date":"2013-10-29T22:05:30"},{"version":"0.08","date":"2013-10-30T10:11:46"},{"date":"2013-11-22T16:19:26","version":"0.09"},{"date":"2013-11-28T16:09:19","version":"1.0"},{"version":"1.1","date":"2013-11-30T18:42:59"},{"date":"2013-12-01T17:11:47","version":"1.11"},{"date":"2013-12-03T10:25:03","version":"1.12"},{"version":"1.2","date":"2013-12-10T21:07:58"},{"version":"1.25","date":"2014-01-05T14:25:36"},{"version":1.26,"date":"2014-10-25T06:37:38"},{"date":"2015-04-27T20:22:15","version":1.3},{"date":"2016-02-08T04:38:25","version":1.4},{"version":1.41,"date":"2016-02-25T14:23:47"},{"date":"2016-04-27T09:40:38","version":1.5},{"date":"2016-12-07T14:14:49","version":1.6},{"version":1.7,"date":"2017-06-27T02:03:48"},{"date":"2018-11-15T19:53:50","version":1.71},{"version":1.8,"date":"2020-11-29T21:36:13"},{"date":"2020-11-30T18:31:32","version":1.81},{"version":1.82,"date":"2020-12-01T01:50:49"},{"version":1.83,"date":"2020-12-08T08:30:59"},{"date":"2021-10-21T01:16:11","version":1.84},{"version":1.85,"date":"2021-10-23T03:00:48"},{"date":"2021-11-04T16:50:24","version":1.86},{"date":"2023-09-10T20:45:43","version":1.87}],"main_module":"CBOR::XS","advisories":[{"severity":null,"affected_versions":["<1.7"],"references":["https://metacpan.org/dist/CBOR-XS/changes"],"id":"CPANSA-CBOR-XS-2017-01","fixed_versions":[">=1.7"],"reported":"2017-07-27","cves":[],"distribution":"CBOR-XS","description":"An out-of bound sharedref or stringref index could cause an out of bounds access - might be exploitable. A decoding error during indefinite array or hash decoding could cause an endless loop.\n"}]},"Archive-Zip":{"advisories":[{"id":"CPANSA-Archive-Zip-2018-01","reported":"2018-06-28","cves":["CVE-2018-10860"],"fixed_versions":[],"distribution":"Archive-Zip","description":"perl-archive-zip is vulnerable to a directory traversal in Archive::Zip. It was found that the Archive::Zip module did not properly sanitize paths while extracting zip files. An attacker able to provide a specially crafted archive for processing could use this flaw to write or overwrite arbitrary files in the context of the perl interpreter.\n","severity":"medium","references":["https://security-tracker.debian.org/tracker/CVE-2018-10860","https://github.com/redhotpenguin/perl-Archive-Zip/pull/33"],"affected_versions":["<1.61"]},{"affected_versions":["<1.14"],"references":["http://www.securityfocus.com/bid/11448","http://www.gentoo.org/security/en/glsa/glsa-200410-31.xml","http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true","http://www.kb.cert.org/vuls/id/492545","http://secunia.com/advisories/13038/","http://www.mandriva.com/security/advisories?name=MDKSA-2004:118","https://exchange.xforce.ibmcloud.com/vulnerabilities/17761"],"severity":null,"distribution":"Archive-Zip","description":"Archive::Zip Perl module before 1.14, when used by antivirus programs such as amavisd-new, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.\n","fixed_versions":[],"reported":"2005-01-10","cves":["CVE-2004-1096"],"id":"CPANSA-Archive-Zip-2004-1096"}],"versions":[{"version":"0.06","date":"2000-03-22T00:10:21"},{"date":"2000-03-29T17:03:46","version":"0.07"},{"date":"2000-06-16T16:48:41","version":"0.09"},{"version":"0.10","date":"2000-08-08T20:56:31"},{"version":"0.11","date":"2001-01-17T08:06:58"},{"version":"1.00","date":"2002-04-22T15:32:49"},{"date":"2002-05-11T02:45:20","version":"1.01"},{"version":"1.02","date":"2002-08-24T00:19:19"},{"version":"1.03","date":"2002-09-03T04:40:33"},{"date":"2002-09-11T15:17:37","version":"1.04"},{"date":"2002-09-11T19:35:26","version":"1.05"},{"date":"2003-07-17T18:18:14","version":"1.06"},{"date":"2003-10-20T13:59:00","version":"1.07"},{"date":"2003-10-21T17:04:03","version":"1.08"},{"date":"2003-11-27T18:02:03","version":"1.09"},{"date":"2004-03-25T14:39:05","version":"1.10"},{"version":"1_11","date":"2004-07-05T23:25:19"},{"version":"1.11","date":"2004-07-08T17:31:27"},{"date":"2004-07-08T19:14:46","version":"1.12"},{"version":"1.12_02","date":"2004-07-27T22:50:39"},{"date":"2004-07-29T15:15:49","version":"1.12_03"},{"version":"1.13","date":"2004-08-23T15:39:23"},{"version":"1.14","date":"2004-10-21T15:28:12"},{"version":"1.15_01","date":"2005-03-10T04:34:04"},{"date":"2005-03-12T15:29:48","version":"1.15_02"},{"date":"2005-06-22T18:29:34","version":"1.15"},{"date":"2005-07-04T17:55:17","version":"1.16"},{"version":"1.17_01","date":"2006-04-30T03:53:15"},{"date":"2006-05-07T02:49:30","version":"1.17_02"},{"date":"2006-09-15T15:56:10","version":"1.17_03"},{"version":"1.17_05","date":"2006-10-24T15:06:32"},{"version":"1.18","date":"2006-10-25T12:24:52"},{"date":"2007-06-05T01:50:42","version":"1.20"},{"version":"1.21","date":"2007-11-01T02:59:20"},{"version":"1.22","date":"2007-11-02T01:52:47"},{"version":"1.23","date":"2007-11-07T13:04:41"},{"version":"1.24","date":"2008-08-23T23:35:50"},{"date":"2008-10-10T05:28:17","version":"1.25"},{"version":"1.26","date":"2008-10-12T14:13:05"},{"version":"1.27_01","date":"2008-12-16T13:23:21"},{"version":"1.28","date":"2009-06-16T10:09:03"},{"version":"1.29","date":"2009-06-29T13:27:17"},{"date":"2009-06-30T14:13:29","version":"1.30"},{"date":"2010-03-05T05:11:20","version":"1.31_01"},{"date":"2011-03-08T15:52:02","version":"1.31_02"},{"date":"2011-08-23T03:42:14","version":"1.31_03"},{"date":"2012-01-23T06:28:16","version":"1.31_04"},{"date":"2013-11-09T00:05:06","version":"1.32"},{"date":"2013-11-10T03:50:45","version":"1.33"},{"version":"1.34","date":"2013-12-02T22:16:54"},{"version":"1.35","date":"2013-12-30T19:16:52"},{"date":"2013-12-30T22:12:14","version":"1.36"},{"date":"2014-01-13T18:32:19","version":"1.37"},{"version":"1.38","date":"2014-09-02T23:23:11"},{"date":"2014-10-22T04:17:15","version":"1.39"},{"version":"1.40","date":"2015-01-05T05:58:46"},{"version":"1.41","date":"2015-01-10T02:47:42"},{"date":"2015-01-12T00:46:36","version":"1.42"},{"version":"1.43","date":"2015-01-15T06:37:32"},{"version":"1.44","date":"2015-01-24T06:12:21"},{"version":"1.45","date":"2015-01-27T07:51:17"},{"version":"1.46","date":"2015-03-25T05:19:23"},{"version":"1.47","date":"2015-06-17T18:26:02"},{"date":"2015-06-18T21:13:37","version":"1.48"},{"version":"1.49","date":"2015-07-31T19:01:40"},{"date":"2015-08-26T00:11:35","version":"1.50"},{"version":"1.51","date":"2015-09-22T06:03:54"},{"version":"1.53","date":"2015-09-23T17:43:44"},{"date":"2015-12-04T19:36:41","version":"1.55"},{"version":"1.56","date":"2015-12-17T18:29:06"},{"date":"2016-04-01T18:06:36","version":"1.57"},{"date":"2016-08-02T17:50:20","version":"1.58"},{"date":"2016-08-11T20:09:16","version":"1.59"},{"version":"1.60","date":"2017-12-19T18:44:16"},{"version":"1.61","date":"2018-08-19T03:35:10"},{"date":"2018-08-20T03:29:01","version":"1.62"},{"date":"2018-08-22T15:42:15","version":"1.63"},{"date":"2018-09-12T15:50:29","version":"1.64"},{"date":"2019-09-08T05:20:03","version":"1.65"},{"version":"1.66","date":"2019-09-17T04:37:32"},{"date":"2019-10-07T04:30:05","version":"1.67"},{"date":"2020-03-12T17:59:46","version":"1.68"}],"main_module":"Archive::Zip"},"Digest-MD5":{"versions":[{"date":"1998-10-23T12:30:56","version":"1.99_53"},{"date":"1998-10-24T13:58:24","version":"1.99_54"},{"version":"1.99_55","date":"1998-10-24T22:44:03"},{"version":"1.99_56","date":"1998-10-24T23:07:15"},{"date":"1998-10-27T21:09:37","version":"1.99_57"},{"date":"1998-10-28T14:11:30","version":"1.99_58"},{"date":"1998-10-28T20:57:10","version":"1.99_59"},{"version":"1.99_60","date":"1998-10-30T17:23:27"},{"date":"1998-11-04T22:27:42","version":"2.00"},{"version":"2.01","date":"1998-12-30T04:01:06"},{"version":"2.02","date":"1999-01-31T16:44:38"},{"date":"1999-02-01T20:25:06","version":"2.02"},{"version":"2.03","date":"1999-02-27T21:39:24"},{"version":"2.04","date":"1999-03-05T21:17:35"},{"date":"1999-03-15T10:58:32","version":"2.05"},{"date":"1999-03-19T05:05:36","version":"2.05"},{"version":"2.06","date":"1999-03-26T13:51:38"},{"version":"2.07","date":"1999-04-26T09:45:43"},{"version":"2.07","date":"1999-06-02T13:44:41"},{"version":"2.08","date":"1999-07-28T10:55:54"},{"version":"2.09","date":"1999-08-05T23:29:15"},{"date":"1999-09-02T12:45:17","version":"2.09"},{"version":"2.10","date":"2000-08-18T08:49:59"},{"version":"2.11","date":"2000-08-19T17:39:04"},{"version":"2.12","date":"2000-09-18T15:10:45"},{"date":"2001-01-19T06:08:47","version":"2.12"},{"version":"2.13","date":"2001-03-14T05:56:41"},{"version":"2.13","date":"2001-03-17T04:35:32"},{"version":"2.13","date":"2001-06-24T07:37:20"},{"version":"2.14","date":"2001-07-18T13:40:13"},{"version":"2.15","date":"2001-08-27T17:53:29"},{"date":"2001-08-29T06:32:30","version":"2.15"},{"version":"2.16","date":"2001-09-07T05:52:46"},{"date":"2002-04-25T17:24:14","version":"2.17"},{"version":"2.18","date":"2002-05-01T23:34:50"},{"date":"2002-05-02T03:21:40","version":"2.19"},{"version":"2.20","date":"2002-05-06T05:20:38"},{"date":"2002-12-28T05:33:19","version":"2.21"},{"date":"2003-01-05T01:04:07","version":"2.22"},{"version":"2.23","date":"2003-01-19T04:55:24"},{"date":"2003-03-09T15:26:49","version":"2.24"},{"date":"2003-07-05T05:33:54","version":"2.25"},{"date":"2003-07-22T06:15:03","version":"2.26"},{"date":"2003-08-05T06:12:31","version":"2.27"},{"version":"2.28","date":"2003-10-06T13:16:20"},{"date":"2003-10-06T17:37:30","version":"2.29"},{"date":"2003-10-09T09:40:47","version":"2.30"},{"version":"2.31","date":"2003-11-28T13:10:59"},{"date":"2003-12-05T10:15:43","version":"2.32"},{"date":"2003-12-07T10:31:15","version":"2.33"},{"version":"2.34","date":"2005-11-26T10:05:19"},{"date":"2005-11-26T11:15:35","version":"2.35"},{"version":"2.36","date":"2005-11-30T13:55:38"},{"version":"2.37","date":"2008-11-12T09:36:42"},{"version":"2.38","date":"2008-11-14T13:50:45"},{"version":"2.39","date":"2009-06-09T20:21:55"},{"version":"2.40","date":"2010-07-03T14:01:25"},{"version":"2.50","date":"2010-09-25T22:12:42"},{"date":"2010-09-30T19:46:29","version":"2.51"},{"version":"2.52","date":"2012-06-07T22:37:00"},{"date":"2013-07-02T17:56:06","version":"2.53"},{"date":"2015-01-12T21:19:42","version":"2.54"},{"version":"2.55","date":"2016-03-09T21:17:10"},{"date":"2020-10-05T17:19:37","version":"2.56"},{"date":"2020-10-05T17:42:48","version":"2.57"},{"date":"2020-10-05T21:53:32","version":"2.58"},{"date":"2023-12-30T21:01:56","version":"2.59"},{"version":"2.36_01","dual_lived":1,"perl_release":"5.009005","date":"2007-07-07T00:00:00"},{"date":"2019-10-20T00:00:00","perl_release":"5.031005","dual_lived":1,"version":"2.55_01"},{"perl_release":"5.038","dual_lived":1,"version":"2.58_01","date":"2023-07-02T00:00:00"}],"main_module":"Digest::MD5","advisories":[{"reported":"2002-07-26","fixed_versions":[],"cves":["CVE-2002-0703"],"description":"An interaction between the Perl MD5 module (perl-Digest-MD5) and Perl could produce incorrect MD5 checksums for UTF-8 data, which could prevent a system from properly verifying the integrity of the data.\n","distribution":"Digest-MD5","id":"CPANSA-Digest-MD5-2002-0703","references":["http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-035.php","http://www.iss.net/security_center/static/9051.php","http://www.securityfocus.com/bid/4716","http://rhn.redhat.com/errata/RHSA-2002-081.html"],"affected_versions":["<2.25"],"severity":null}]},"MT":{"main_module":"","versions":[],"advisories":[{"cves":["CVE-2013-0209"],"reported":"2013-01-23","fixed_versions":[],"description":"lib/MT/Upgrade.pm in mt-upgrade.cgi in Movable Type 4.2x and 4.3x through 4.38 does not require authentication for requests to database-migration functions, which allows remote attackers to conduct eval injection and SQL injection attacks via crafted parameters, as demonstrated by an eval injection attack against the core_drop_meta_for_table function, leading to execution of arbitrary Perl code.\n","distribution":"MT","darkpan":"true","id":"CPANSA-MT-2013-0209","references":["http://www.sec-1.com/blog/wp-content/uploads/2013/01/movabletype_upgrade_exec.rb_.txt","http://www.movabletype.org/2013/01/movable_type_438_patch.html","http://openwall.com/lists/oss-security/2013/01/22/3","http://www.sec-1.com/blog/?p=402"],"affected_versions":[">=4.20,<=4.38"],"severity":null},{"affected_versions":[">=7,<=7.9.4",">=6,<=6.8.6",">=4,<=5"],"references":["https://movabletype.org/news/2022/08/mt-795-687-released.html","https://jvn.jp/en/jp/JVN57728859/index.html"],"severity":"critical","distribution":"MT","description":"Movable Type XMLRPC API provided by Six Apart Ltd. contains a command injection vulnerability. Sending a specially crafted message by POST method to Movable Type XMLRPC API may allow arbitrary Perl script execution, and an arbitrary OS command may be executed through it. Affected products and versions are as follows: Movable Type 7 r.5202 and earlier, Movable Type Advanced 7 r.5202 and earlier, Movable Type 6.8.6 and earlier, Movable Type Advanced 6.8.6 and earlier, Movable Type Premium 1.52 and earlier, and Movable Type Premium Advanced 1.52 and earlier. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability.\n","reported":"2022-08-24","fixed_versions":[">=7.9.5",">=6.8.7,<7"],"cves":["CVE-2022-38078"],"id":"CPANSA-MT-2022-38078","darkpan":"true"},{"references":["https://jvn.jp/en/jp/JVN41119755/index.html","https://movabletype.org/news/2021/10/mt-782-683-released.html","http://packetstormsecurity.com/files/164818/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html","http://packetstormsecurity.com/files/164705/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html"],"affected_versions":[">=7,<=7.8.1",">=6,<=6.8.2","<6"],"severity":"critical","fixed_versions":[],"reported":"2021-10-26","cves":["CVE-2021-20837"],"distribution":"MT","description":"Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8.2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability.\n","darkpan":"true","id":"CPANSA-MT-2021-20837"},{"id":"CPANSA-MT-2021-20814","darkpan":"true","description":"Cross-site scripting vulnerability in Setting screen of ContentType Information Widget Plugin of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), and Movable Type Premium 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n","distribution":"MT","reported":"2021-08-26","cves":["CVE-2021-20814"],"fixed_versions":[],"severity":"medium","affected_versions":[">=7,<7.8.0"],"references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"]},{"severity":"medium","references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"],"affected_versions":[">=7,<7.8.0"],"darkpan":"true","id":"CPANSA-MT-2021-20813","fixed_versions":[],"reported":"2021-08-26","cves":["CVE-2021-20813"],"description":"Cross-site scripting vulnerability in Edit screen of Content Data of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series) and Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series)) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n","distribution":"MT"},{"affected_versions":[">=7,<7.8.0",">=6,<=6.8.0"],"references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"],"severity":"medium","reported":"2021-08-26","fixed_versions":[],"cves":["CVE-2021-20815"],"distribution":"MT","description":"Cross-site scripting vulnerability in Edit Boilerplate screen of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n","darkpan":"true","id":"CPANSA-MT-2021-20815"},{"distribution":"MT","description":"Cross-site scripting vulnerability in List of Assets screen of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n","fixed_versions":[],"reported":"2021-08-26","cves":["CVE-2021-20811"],"id":"CPANSA-MT-2021-20811","darkpan":"true","affected_versions":[">=7,<7.8.0",">=6,<=6.8.0"],"references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"],"severity":"medium"},{"severity":"medium","affected_versions":[">=7,<7.8.0",">=6,<=6.8.0"],"references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"],"darkpan":"true","id":"CPANSA-MT-2021-20810","cves":["CVE-2021-20810"],"reported":"2021-08-26","fixed_versions":[],"distribution":"MT","description":"Cross-site scripting vulnerability in Website Management screen of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n"},{"darkpan":"true","id":"CPANSA-MT-2021-20809","reported":"2021-08-26","cves":["CVE-2021-20809"],"fixed_versions":[],"distribution":"MT","description":"Cross-site scripting vulnerability in Create screens of Entry, Page, and Content Type of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n","severity":"medium","affected_versions":[">=7,<7.8.0",">=6,<=6.8.0"],"references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"]},{"affected_versions":[">=7,<7.8.0",">=6,<=6.8.0"],"references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"],"severity":"medium","cves":["CVE-2021-20808"],"reported":"2021-08-26","fixed_versions":[],"description":"Cross-site scripting vulnerability in Search screen of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n","distribution":"MT","darkpan":"true","id":"CPANSA-MT-2021-20808"},{"reported":"2021-10-26","fixed_versions":[],"cves":["CVE-2020-5669"],"description":"Cross-site scripting vulnerability in Movable Type Movable Type Premium 1.37 and earlier and Movable Type Premium Advanced 1.37 and earlier allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors.\n","distribution":"MT","darkpan":"true","id":"CPANSA-MT-2020-5669","affected_versions":["<=1.37"],"references":["https://www.sixapart.jp/movabletype/news/2020/11/18-1101.html","https://jvn.jp/en/jp/JVN94245475/index.html"],"severity":"medium"},{"severity":"high","affected_versions":[">=7,<7.2.1",">=6,<=6.5.3"],"references":["https://jvn.jp/en/jp/JVN28806943/index.html","https://movabletype.org/news/2020/05/mt-730-660-6312-released.html"],"darkpan":"true","id":"CPANSA-MT-2020-5577","reported":"2020-05-14","cves":["CVE-2020-5577"],"fixed_versions":[],"distribution":"MT","description":"Movable Type series (Movable Type 7 r.4606 (7.2.1) and earlier (Movable Type 7), Movable Type Advanced 7 r.4606 (7.2.1) and earlier (Movable Type Advanced 7), Movable Type for AWS 7 r.4606 (7.2.1) and earlier (Movable Type for AWS 7), Movable Type 6.5.3 and earlier (Movable Type 6.5), Movable Type Advanced 6.5.3 and earlier (Movable Type Advanced 6.5), Movable Type 6.3.11 and earlier (Movable Type 6.3), Movable Type Advanced 6.3.11 and earlier (Movable Type 6.3), Movable Type Premium 1.29 and earlier, and Movable Type Premium Advanced 1.29 and earlier) allow remote authenticated attackers to upload arbitrary files and execute a php script via unspecified vectors.\n"},{"severity":"high","affected_versions":[">=7,<7.2.1",">=6,<=6.5.3"],"references":["https://jvn.jp/en/jp/JVN28806943/index.html","https://movabletype.org/news/2020/05/mt-730-660-6312-released.html"],"id":"CPANSA-MT-2020-5576","darkpan":"true","description":"Cross-site request forgery (CSRF) vulnerability in Movable Type series (Movable Type 7 r.4606 (7.2.1) and earlier (Movable Type 7), Movable Type Advanced 7 r.4606 (7.2.1) and earlier (Movable Type Advanced 7), Movable Type for AWS 7 r.4606 (7.2.1) and earlier (Movable Type for AWS 7), Movable Type 6.5.3 and earlier (Movable Type 6.5), Movable Type Advanced 6.5.3 and earlier (Movable Type Advanced 6.5), Movable Type 6.3.11 and earlier (Movable Type 6.3), Movable Type Advanced 6.3.11 and earlier (Movable Type 6.3), Movable Type Premium 1.29 and earlier, and Movable Type Premium Advanced 1.29 and earlier) allows remote attackers to hijack the authentication of administrators via unspecified vectors.\n","distribution":"MT","reported":"2020-05-14","fixed_versions":[],"cves":["CVE-2020-5576"]},{"darkpan":"true","id":"CPANSA-MT-2020-5575","fixed_versions":[],"reported":"2020-05-14","cves":["CVE-2020-5575"],"distribution":"MT","description":"Cross-site scripting vulnerability in Movable Type series (Movable Type 7 r.4606 (7.2.1) and earlier (Movable Type 7), Movable Type Advanced 7 r.4606 (7.2.1) and earlier (Movable Type Advanced 7), Movable Type for AWS 7 r.4606 (7.2.1) and earlier (Movable Type for AWS 7), Movable Type 6.5.3 and earlier (Movable Type 6.5), Movable Type Advanced 6.5.3 and earlier (Movable Type Advanced 6.5), Movable Type 6.3.11 and earlier (Movable Type 6.3), Movable Type Advanced 6.3.11 and earlier (Movable Type 6.3), Movable Type Premium 1.29 and earlier, and Movable Type Premium Advanced 1.29 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n","severity":"medium","references":["https://jvn.jp/en/jp/JVN28806943/index.html","https://movabletype.org/news/2020/05/mt-730-660-6312-released.html"],"affected_versions":[">=7,<7.2.1",">=6,<=6.5.3"]},{"id":"CPANSA-MT-2020-5574","darkpan":"true","distribution":"MT","description":"HTML attribute value injection vulnerability in Movable Type series (Movable Type 7 r.4606 (7.2.1) and earlier (Movable Type 7), Movable Type Advanced 7 r.4606 (7.2.1) and earlier (Movable Type Advanced 7), Movable Type for AWS 7 r.4606 (7.2.1) and earlier (Movable Type for AWS 7), Movable Type 6.5.3 and earlier (Movable Type 6.5), Movable Type Advanced 6.5.3 and earlier (Movable Type Advanced 6.5), Movable Type 6.3.11 and earlier (Movable Type 6.3), Movable Type Advanced 6.3.11 and earlier (Movable Type 6.3), Movable Type Premium 1.29 and earlier, and Movable Type Premium Advanced 1.29 and earlier) allows remote attackers to inject arbitrary HTML attribute value via unspecified vectors.\n","reported":"2020-05-14","fixed_versions":[],"cves":["CVE-2020-5574"],"severity":"medium","affected_versions":[">=7,<7.2.1",">=6,<=6.5.3"],"references":["https://jvn.jp/en/jp/JVN28806943/index.html","https://movabletype.org/news/2020/05/mt-730-660-6312-released.html"]},{"references":["https://movabletype.org/news/2020/02/movable_type_r4605_v720_v653_and_v6311_released.html","http://jvn.jp/en/jp/JVN94435544/index.html"],"affected_versions":[">=7,<7.1.4",">=6,<=6.5.2"],"severity":"medium","distribution":"MT","description":"Cross-site scripting vulnerability in Movable Type series (Movable Type 7 r.4603 and earlier (Movable Type 7), Movable Type 6.5.2 and earlier (Movable Type 6.5), Movable Type Advanced 7 r.4603 and earlier (Movable Type Advanced 7), Movable Type Advanced 6.5.2 and earlier (Movable Type Advanced 6.5), Movable Type Premium 1.26 and earlier (Movable Type Premium), and Movable Type Premium Advanced 1.26 and earlier (Movable Type Premium Advanced)) allows remote attackers to inject arbitrary web script or HTML in the block editor and the rich text editor via a specially crafted URL.\n","cves":["CVE-2020-5528"],"reported":"2020-02-06","fixed_versions":[],"id":"CPANSA-MT-2020-5528","darkpan":"true"},{"darkpan":"true","id":"CPANSA-MT-2019-6025","reported":"2019-12-26","fixed_versions":[],"cves":["CVE-2019-6025"],"distribution":"MT","description":"Open redirect vulnerability in Movable Type series Movable Type 7 r.4602 (7.1.3) and earlier (Movable Type 7), Movable Type 6.5.0 and 6.5.1 (Movable Type 6.5), Movable Type 6.3.9 and earlier (Movable Type 6.3.x, 6.2.x, 6.1.x, 6.0.x), Movable Type Advanced 7 r.4602 (7.1.3) and earlier (Movable Type 7), Movable Type Advanced 6.5.0 and 6.5.1 (Movable Type 6.5), Movable Type Advanced 6.3.9 and earlier (Movable Type 6.3.x, 6.2.x, 6.1.x, 6.0.x), Movable Type Premium 1.24 and earlier (Movable Type Premium), and Movable Type Premium (Advanced Edition) 1.24 and earlier (Movable Type Premium) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted URL.\n","severity":"medium","references":["https://movabletype.org/news/2019/11/movable_type_r4603_v714_v652_and_v6310_released.html","http://jvn.jp/en/jp/JVN65280626/index.html"],"affected_versions":[">=7,<7.1.3",">=6.5.0,<=6.5.1",">=6,<=6.3.9"]},{"id":"CPANSA-MT-2018-0672","darkpan":"true","description":"Cross-site scripting vulnerability in Movable Type versions prior to Ver. 6.3.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.\n","distribution":"MT","fixed_versions":[],"reported":"2018-09-04","cves":["CVE-2018-0672"],"severity":"medium","references":["http://jvn.jp/en/jp/JVN89550319/index.html"],"affected_versions":["=6.3.1"]},{"affected_versions":[">=6.0.0,<6.1.3",">=6.2.0,<6.2.6","<5.2.13"],"references":["https://movabletype.org/news/2016/06/movable_type_626_and_613_released.html","http://www.openwall.com/lists/oss-security/2016/06/22/6","http://www.openwall.com/lists/oss-security/2016/06/22/5","http://www.openwall.com/lists/oss-security/2016/06/22/3","http://www.securitytracker.com/id/1036160"],"severity":"critical","reported":"2017-01-23","fixed_versions":[],"cves":["CVE-2016-5742"],"distribution":"MT","description":"SQL injection vulnerability in the XML-RPC interface in Movable Type Pro and Advanced 6.x before 6.1.3 and 6.2.x before 6.2.6 and Movable Type Open Source 5.2.13 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.\n","darkpan":"true","id":"CPANSA-MT-2016-5742"},{"severity":null,"affected_versions":["<5.2.12",">=6.0.0,<=6.0.7"],"references":["https://movabletype.org/news/2015/02/movable_type_607_and_5212_released_to_close_security_vulnera.html","http://www.securityfocus.com/bid/72606","http://www.openwall.com/lists/oss-security/2015/02/12/17","http://www.openwall.com/lists/oss-security/2015/02/12/2","https://www.debian.org/security/2015/dsa-3183","http://www.securitytracker.com/id/1031777","https://exchange.xforce.ibmcloud.com/vulnerabilities/100912"],"darkpan":"true","id":"CPANSA-MT-2015-1592","fixed_versions":[],"reported":"2015-02-19","cves":["CVE-2015-1592"],"description":"Movable Type Pro, Open Source, and Advanced before 5.2.12 and Pro and Advanced 6.0.x before 6.0.7 does not properly use the Perl Storable::thaw function, which allows remote attackers to include and execute arbitrary local Perl files and possibly execute arbitrary code via unspecified vectors.\n","distribution":"MT"},{"affected_versions":["<5.18",">=5.2.0,<5.2.11",">=6,<6.0.6"],"references":["https://movabletype.org/news/2014/12/6.0.6.html","https://movabletype.org/documentation/appendices/release-notes/6.0.6.html","http://secunia.com/advisories/61227","https://www.debian.org/security/2015/dsa-3183"],"severity":null,"description":"SQL injection vulnerability in the XML-RPC interface in Movable Type before 5.18, 5.2.x before 5.2.11, and 6.x before 6.0.6 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.\n","distribution":"MT","reported":"2014-12-16","cves":["CVE-2014-9057"],"fixed_versions":[],"id":"CPANSA-MT-2014-9057","darkpan":"true"},{"distribution":"MT","description":"Movable Type before 5.2.6 does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via the comment_state parameter.\n","reported":"2015-03-27","fixed_versions":[],"cves":["CVE-2013-2184"],"id":"CPANSA-MT-2013-2184","darkpan":"true","references":["https://movabletype.org/documentation/appendices/release-notes/movable-type-526-release-notes.html","http://www.debian.org/security/2015/dsa-3183","http://seclists.org/oss-sec/2013/q2/568","http://seclists.org/oss-sec/2013/q2/560"],"affected_versions":["<5.2.6"],"severity":null},{"affected_versions":["=5.13"],"references":["http://www.cloudscan.me/2012/10/cve-2012-1503-movable-type-pro-513en.html","http://packetstormsecurity.org/files/117564/Movable-Type-Pro-5.13en-Cross-Site-Scripting.html","http://www.exploit-db.com/exploits/22151","http://osvdb.org/show/osvdb/86729","http://www.securityfocus.com/bid/56160","https://exchange.xforce.ibmcloud.com/vulnerabilities/79521"],"severity":null,"fixed_versions":[],"reported":"2014-08-29","cves":["CVE-2012-1503"],"description":"Cross-site scripting (XSS) vulnerability in Six Apart (formerly Six Apart KK) Movable Type (MT) Pro 5.13 allows remote attackers to inject arbitrary web script or HTML via the comment section.\n","distribution":"MT","darkpan":"true","id":"CPANSA-MT-2012-1503"},{"severity":null,"references":["http://www.movabletype.org/2012/02/movable_type_513_507_and_438_security_updates.html","http://www.movabletype.org/documentation/appendices/release-notes/513.html","http://jvndb.jvn.jp/jvndb/JVNDB-2012-000018","http://jvn.jp/en/jp/JVN20083397/index.html","http://www.securitytracker.com/id?1026738","http://www.securityfocus.com/bid/52138","http://www.debian.org/security/2012/dsa-2423"],"affected_versions":["<4.38",">=5,<5.07",">=5.10,<5.13"],"darkpan":"true","id":"CPANSA-MT-2012-0320","fixed_versions":[],"reported":"2012-03-03","cves":["CVE-2012-0320"],"description":"Movable Type before 4.38, 5.0x before 5.07, and 5.1x before 5.13 allows remote attackers to take control of sessions via unspecified vectors related to the (1) commenting feature and (2) community script.\n","distribution":"MT"},{"references":["http://jvn.jp/en/jp/JVN70683217/index.html","http://www.movabletype.org/documentation/appendices/release-notes/513.html","http://www.movabletype.org/2012/02/movable_type_513_507_and_438_security_updates.html","http://jvndb.jvn.jp/jvndb/JVNDB-2012-000015","http://www.securitytracker.com/id?1026738","http://www.securityfocus.com/bid/52138","http://www.debian.org/security/2012/dsa-2423"],"affected_versions":["<4.38",">=5,<5.07",">=5.10,<5.13"],"severity":null,"distribution":"MT","description":"Multiple cross-site request forgery (CSRF) vulnerabilities in Movable Type before 4.38, 5.0x before 5.07, and 5.1x before 5.13 allow remote attackers to hijack the authentication of arbitrary users for requests that modify data via the (1) commenting feature or (2) community script.\n","reported":"2012-03-03","fixed_versions":[],"cves":["CVE-2012-0317"],"id":"CPANSA-MT-2012-0317","darkpan":"true"},{"reported":"2012-04-02","fixed_versions":[],"cves":["CVE-2011-5085"],"description":"Unspecified vulnerability in Movable Type 4.x before 4.36 and 5.x before 5.05 allows remote attackers to read or modify data via unknown vectors.\n","distribution":"MT","darkpan":"true","id":"CPANSA-MT-2011-5085","references":["http://www.movabletype.org/2011/05/movable_type_51_and_505_436_security_update.html","http://www.debian.org/security/2012/dsa-2423"],"affected_versions":[">=4,<4.36",">=5,<5.05"],"severity":null},{"severity":null,"references":["http://www.movabletype.org/2011/05/movable_type_51_and_505_436_security_update.html","http://www.debian.org/security/2012/dsa-2423"],"affected_versions":[">=4,<4.36",">=5,<5.05"],"darkpan":"true","id":"CPANSA-MT-2011-5084","reported":"2012-04-02","cves":["CVE-2011-5084"],"fixed_versions":[],"distribution":"MT","description":"Cross-site scripting (XSS) vulnerability in Movable Type 4.x before 4.36 and 5.x before 5.05 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.\n"},{"darkpan":"true","id":"CPANSA-MT-2010-1985","fixed_versions":[],"reported":"2010-05-19","cves":["CVE-2010-1985"],"distribution":"MT","description":"Multiple cross-site scripting (XSS) vulnerabilities in the administrative user interface in Six Apart Movable Type 5.0 and 5.01 allow remote attackers to inject arbitrary web script or HTML via unknown vectors.\n","severity":null,"references":["http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000017.html","http://www.movabletype.com/blog/2010/05/movable-type-502.html","http://www.vupen.com/english/advisories/2010/1136","http://secunia.com/advisories/39741","http://www.movabletype.org/documentation/appendices/release-notes/movable-type-502.html","http://jvn.jp/en/jp/JVN92854093/index.html"],"affected_versions":[">=5.0,<=5.01"]},{"description":"Cross-site scripting (XSS) vulnerability in mt-wizard.cgi in Six Apart Movable Type before 4.261 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2009-2480.\n","distribution":"MT","fixed_versions":[],"reported":"2009-07-17","cves":["CVE-2009-2492"],"id":"CPANSA-MT-2009-2492","darkpan":"true","affected_versions":["<4.261"],"references":["http://jvn.jp/en/jp/JVN86472161/index.html","http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000042.html","http://www.vupen.com/english/advisories/2009/1668","http://secunia.com/advisories/35534","http://www.securityfocus.com/bid/35885"],"severity":null},{"reported":"2009-07-16","cves":["CVE-2009-2481"],"fixed_versions":[],"description":"mt-wizard.cgi in Six Apart Movable Type before 4.261, when global templates are not initialized, allows remote attackers to bypass access restrictions and (1) send e-mail to arbitrary addresses or (2) obtain sensitive information via unspecified vectors.\n","distribution":"MT","darkpan":"true","id":"CPANSA-MT-2009-2481","references":["http://jvn.jp/en/jp/JVN08369659/index.html","http://www.vupen.com/english/advisories/2009/1668","http://www.securityfocus.com/bid/35471","http://secunia.com/advisories/35534","http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000043.html","https://exchange.xforce.ibmcloud.com/vulnerabilities/51330"],"affected_versions":["<4.261"],"severity":null},{"severity":null,"affected_versions":["<4.24"],"references":["http://www.movabletype.com/blog/2009/02/movable-type-424-get-updated-with-better-password-recovery.html"],"darkpan":"true","id":"CPANSA-MT-2009-0752","reported":"2009-03-03","cves":["CVE-2009-0752"],"fixed_versions":[],"description":"Unspecified vulnerability in Movable Type Pro and Community Solution 4.x before 4.24 has unknown impact and attack vectors, possibly related to the password recovery mechanism.\n","distribution":"MT"},{"description":"Six Apart Movable Type (MT) before 4.23 allows remote authenticated users with create permission for posts to bypass intended access restrictions and publish posts via a \"system-wide entry listing screen.\"\n","distribution":"MT","reported":"2009-01-05","cves":["CVE-2008-5846"],"fixed_versions":[],"id":"CPANSA-MT-2008-5846","darkpan":"true","references":["http://www.movabletype.org/mt_423_change_log.html","http://www.securityfocus.com/bid/33133","https://exchange.xforce.ibmcloud.com/vulnerabilities/47759"],"affected_versions":["<4.23"],"severity":null},{"id":"CPANSA-MT-2008-5845","darkpan":"true","description":"Multiple cross-site scripting (XSS) vulnerabilities in Six Apart Movable Type (MT) before 4.23 allow remote attackers to inject arbitrary web script or HTML via a (1) MTEntryAuthorUsername, (2) MTAuthorDisplayName, (3) MTEntryAuthorDisplayName, or (4) MTCommenterName field in a Profile View template; a (5) listing screen or (6) edit screen in the CMS app; (7) a TrackBack title, related to the HTML sanitization library; or (8) a user archive name (aka archive title) on a published Community Blog template.\n","distribution":"MT","reported":"2009-01-05","fixed_versions":[],"cves":["CVE-2008-5845"],"severity":null,"affected_versions":["<4.23"],"references":["http://www.movabletype.org/mt_423_change_log.html","http://jvndb.jvn.jp/ja/contents/2011/JVNDB-2011-000031.html","http://jvn.jp/en/jp/JVN45658190/index.html"]},{"references":["http://secunia.com/advisories/32935","http://www.securityfocus.com/bid/32604","http://jvn.jp/en/jp/JVN02216739/index.html","http://www.movabletype.jp/blog/_movable_type_423.html","http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000067.html","https://exchange.xforce.ibmcloud.com/vulnerabilities/47019"],"affected_versions":[">=3,<=3.38",">=4,<4.23"],"severity":null,"reported":"2009-01-02","cves":["CVE-2008-5808"],"fixed_versions":[],"description":"Cross-site scripting (XSS) vulnerability in Six Apart Movable Type Enterprise (MTE) 1.x before 1.56; Movable Type (MT) 3.x before 3.38; and Movable Type, Movable Type Open Source (MTOS), and Movable Type Enterprise 4.x before 4.23 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, possibly related to \"application management.\"\n","distribution":"MT","darkpan":"true","id":"CPANSA-MT-2008-5808"},{"id":"CPANSA-MT-2021-20812","darkpan":"true","distribution":"MT","description":"Cross-site scripting vulnerability in Setting screen of Server Sync of Movable Type (Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series) and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n","cves":["CVE-2021-20812"],"reported":"2021-08-26","fixed_versions":[],"severity":"medium","references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"],"affected_versions":[">=7,<=7.7.1"]},{"description":"Improper neutralization of Server-Side Includes (SSW) within a web page in Movable Type series allows a remote authenticated attacker with Privilege of 'Manage of Content Types' may execute an arbitrary Perl script and/or an arbitrary OS command. Affected products/versions are as follows: Movable Type 7 r.5301 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5301 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.53 and earlier, and Movable Type Premium Advanced 1.53 and earlier.\n","distribution":"MT","cves":["CVE-2022-43660"],"reported":"2022-12-07","fixed_versions":[],"id":"CPANSA-MT-2022-43660","darkpan":"true","references":["https://movabletype.org/news/2022/11/mt-796-688-released.html","https://jvn.jp/en/jp/JVN37014768/index.html"],"affected_versions":["<=7"],"severity":null}]},"Otogiri":{"versions":[{"date":"2013-10-30T06:45:51","version":"0.01"},{"date":"2013-11-08T08:36:50","version":"0.02"},{"version":"0.03","date":"2013-11-09T05:00:47"},{"date":"2013-12-27T00:15:23","version":"0.04"},{"date":"2013-12-28T15:54:15","version":"0.05"},{"date":"2014-01-14T09:13:18","version":"0.06"},{"date":"2014-02-25T06:25:50","version":"0.07"},{"date":"2014-03-18T04:14:12","version":"0.08"},{"date":"2014-03-18T05:07:37","version":"0.09"},{"date":"2014-05-13T12:58:21","version":"0.10"},{"version":"0.11","date":"2014-05-30T10:11:18"},{"date":"2014-06-05T08:30:13","version":"0.12"},{"version":"0.13","date":"2014-07-03T12:40:28"},{"date":"2014-12-18T08:37:33","version":"0.14"},{"version":"0.15","date":"2015-01-11T04:56:15"},{"date":"2015-11-13T07:18:18","version":"0.16"},{"date":"2016-02-02T05:58:26","version":"0.17"},{"date":"2017-05-19T01:37:05","version":"0.18"},{"version":"0.19","date":"2020-01-17T11:12:52"},{"version":"0.20","date":"2023-10-15T02:01:31"},{"date":"2023-10-15T02:02:58","version":"0.21"},{"date":"2023-12-10T00:23:20","version":"0.22"},{"version":"0.23","date":"2024-06-08T13:42:18"}],"main_module":"Otogiri","advisories":[{"affected_versions":["<0.13"],"references":["https://github.com/ytnobody/Otogiri/commit/fac1592b3d153a6871ff1aed8016a6888cff9095","https://metacpan.org/changes/distribution/Otogiri"],"id":"CPANSA-Otogiri-2014-01","distribution":"Otogiri","description":"A dependant module SQL::Maker without strict mode is vulnerable to SQL injection.\n","fixed_versions":[">=0.13"],"reported":"2014-07-03","cves":[]}]},"Imager":{"main_module":"Imager","versions":[{"date":"1999-07-19T14:26:37","version":"0.21"},{"date":"2000-01-03T20:14:03","version":"0.27"},{"date":"2000-01-04T11:16:56","version":"0.28"},{"version":"0.29","date":"2000-01-05T10:48:05"},{"date":"2000-01-16T12:52:22","version":"0.31"},{"version":"0.32","date":"2000-03-04T13:28:32"},{"date":"2001-01-29T00:50:14","version":"0.35"},{"version":"0.36","date":"2001-01-29T15:06:27"},{"date":"2001-01-31T05:02:15","version":"0.37"},{"date":"2001-05-21T16:21:08","version":"0.38"},{"version":"0.39","date":"2001-11-02T21:39:20"},{"date":"2002-04-11T15:09:57","version":"0.40"},{"date":"2002-04-12T12:07:29","version":"0.41"},{"version":"0.42","date":"2004-01-04T12:47:37"},{"version":"0.43","date":"2004-02-17T07:53:52"},{"version":"0.43_03","date":"2004-12-07T23:58:16"},{"version":"0.44","date":"2004-12-15T13:02:40"},{"version":"0.44_01","date":"2005-05-24T07:08:15"},{"date":"2005-05-30T04:41:43","version":"0.45"},{"version":"0.45_02","date":"2005-12-12T04:07:30"},{"version":"0.46","date":"2005-12-20T00:13:31"},{"version":"0.47","date":"2005-12-30T06:05:50"},{"version":"0.47_01","date":"2006-02-21T06:09:30"},{"version":"0.48","date":"2006-03-03T05:06:46"},{"date":"2006-03-07T01:04:03","version":"0.49"},{"version":"0.49_01","date":"2006-03-28T04:31:56"},{"date":"2006-03-29T00:31:03","version":"0.50"},{"version":"0.51","date":"2006-04-23T14:29:42"},{"version":"0.51_01","date":"2006-06-28T13:38:48"},{"version":"0.51_02","date":"2006-07-04T14:03:23"},{"date":"2006-07-19T00:58:22","version":"0.51_03"},{"version":"0.52","date":"2006-07-25T05:09:08"},{"date":"2006-07-27T01:01:57","version":"0.53"},{"version":"0.54","date":"2006-09-14T07:58:27"},{"version":"0.55","date":"2006-12-16T22:31:19"},{"version":"0.56","date":"2007-04-01T12:30:34"},{"version":"0.57","date":"2007-04-30T08:49:39"},{"date":"2007-05-11T11:00:18","version":"0.57_01"},{"version":"0.58","date":"2007-05-16T12:49:23"},{"date":"2007-06-14T07:33:05","version":"0.59"},{"date":"2007-08-30T07:51:36","version":"0.60"},{"date":"2007-11-05T07:53:45","version":"0.61"},{"date":"2007-11-28T10:06:27","version":"0.61_02"},{"date":"2007-12-10T08:31:12","version":"0.62"},{"date":"2008-04-07T08:49:14","version":"0.63"},{"version":"0.64","date":"2008-04-23T04:10:18"},{"date":"2008-05-20T06:34:48","version":"0.65"},{"version":"0.67","date":"2008-12-12T11:57:40"},{"date":"2009-09-02T07:05:11","version":"0.67_01"},{"date":"2009-09-07T05:14:24","version":"0.68"},{"version":"0.69","date":"2009-09-08T09:23:38"},{"date":"2009-09-21T03:36:15","version":"0.70"},{"date":"2009-11-16T04:15:54","version":"0.71"},{"version":"0.71_01","date":"2009-11-30T07:17:33"},{"date":"2009-12-01T09:06:53","version":"0.71_02"},{"version":"0.71_03","date":"2009-12-04T14:21:49"},{"version":"0.72","date":"2009-12-10T00:44:51"},{"version":"0.73","date":"2010-03-15T07:24:59"},{"version":"0.74","date":"2010-05-06T14:29:21"},{"date":"2010-06-20T10:47:23","version":"0.75"},{"date":"2010-08-06T10:49:44","version":"0.75_01"},{"date":"2010-08-07T01:48:37","version":"0.75_02"},{"date":"2010-08-09T12:49:36","version":"0.75_03"},{"date":"2010-08-11T09:33:24","version":"0.77"},{"version":"0.77_01","date":"2010-09-13T10:48:57"},{"date":"2010-09-27T04:59:03","version":"0.77_02"},{"version":"0.78","date":"2010-10-04T09:00:26"},{"date":"2010-12-11T01:09:12","version":"0.79"},{"date":"2011-01-17T07:43:35","version":"0.80"},{"version":"0.81","date":"2011-02-14T08:22:57"},{"date":"2011-03-14T12:18:07","version":"0.82"},{"version":"0.82_01","date":"2011-05-17T11:15:02"},{"version":"0.83","date":"2011-05-20T14:07:44"},{"version":"0.84","date":"2011-06-20T12:54:05"},{"date":"2011-08-08T12:39:58","version":"0.84_01"},{"version":"0.84_02","date":"2011-08-22T09:28:25"},{"date":"2011-08-29T09:19:04","version":"0.85"},{"version":"0.85_01","date":"2011-10-10T07:22:51"},{"version":"0.85_02","date":"2011-10-24T10:14:57"},{"date":"2011-10-31T10:37:15","version":"0.86"},{"version":"0.87","date":"2012-01-03T05:27:14"},{"version":"0.88","date":"2012-02-22T05:13:09"},{"date":"2012-03-18T01:45:35","version":"0.89"},{"date":"2012-04-30T09:09:02","version":"0.90"},{"version":"0.91","date":"2012-06-04T12:27:17"},{"date":"2012-08-14T09:53:38","version":"0.92"},{"version":"0.92_01","date":"2012-08-18T01:41:22"},{"date":"2012-10-15T10:15:07","version":"0.93"},{"date":"2012-11-12T10:44:54","version":"0.93_01"},{"date":"2012-11-25T00:13:16","version":"0.93_02"},{"version":"0.94","date":"2012-12-14T22:59:55"},{"date":"2013-03-02T08:34:07","version":"0.94_01"},{"version":"0.94_02","date":"2013-04-05T06:19:32"},{"version":"0.95","date":"2013-04-19T12:13:27"},{"version":"0.96","date":"2013-05-19T04:27:19"},{"version":"0.96_01","date":"2013-07-01T13:21:32"},{"date":"2013-07-09T13:46:48","version":"0.96_02"},{"version":"0.97","date":"2013-07-15T09:52:06"},{"date":"2014-01-02T22:22:03","version":"0.98"},{"date":"2014-06-25T11:36:29","version":"0.99"},{"version":"0.99_01","date":"2014-06-29T05:06:45"},{"version":"0.99_02","date":"2014-07-21T09:16:17"},{"date":"2014-07-29T09:13:55","version":"1.000"},{"date":"2015-01-02T03:34:59","version":"1.001"},{"version":"1.002","date":"2015-04-03T01:31:26"},{"date":"2015-05-12T08:11:18","version":"1.003"},{"version":"1.004","date":"2015-11-08T09:45:59"},{"date":"2016-03-16T08:35:26","version":"1.004_001"},{"version":"1.004_002","date":"2016-03-20T01:27:53"},{"date":"2016-03-23T09:34:13","version":"1.004_003"},{"version":"1.004_004","date":"2016-04-15T05:58:07"},{"date":"2016-04-16T00:01:33","version":"1.005"},{"date":"2017-08-26T04:27:06","version":"1.006"},{"date":"2018-11-24T01:47:34","version":"1.007"},{"version":"1.008","date":"2018-12-31T10:04:02"},{"version":"1.009","date":"2019-01-11T09:10:13"},{"date":"2019-02-13T08:14:07","version":"1.010"},{"version":"1.011","date":"2019-03-07T03:20:03"},{"version":"1.012","date":"2020-06-14T03:26:02"},{"version":"1.013","date":"2022-04-27T05:18:23"},{"version":"1.014","date":"2022-04-28T07:22:51"},{"date":"2022-05-07T04:35:16","version":"1.015"},{"date":"2022-06-12T05:27:23","version":"1.016"},{"version":"1.017","date":"2022-06-14T09:55:03"},{"version":"1.018","date":"2022-06-19T12:04:12"},{"date":"2022-07-09T03:41:29","version":"1.019"},{"version":"1.020","date":"2023-11-12T06:55:05"},{"version":"1.021","date":"2023-12-01T06:53:47"},{"date":"2023-12-02T23:32:54","version":"1.022"},{"date":"2024-01-19T03:18:43","version":"1.023"},{"date":"2024-04-06T02:24:09","version":"1.024"},{"version":"1.024_001","date":"2024-04-14T12:28:26"},{"version":"1.024_002","date":"2024-04-20T07:15:38"},{"date":"2024-04-22T12:51:23","version":"1.024_003"},{"version":"1.024_004","date":"2024-04-24T08:35:58"},{"version":"1.024_005","date":"2024-04-27T01:24:42"},{"version":"1.024_006","date":"2024-06-11T11:35:22"},{"version":"1.024_007","date":"2024-06-12T09:58:08"},{"version":"1.024_008","date":"2024-06-13T10:45:14"},{"version":"1.025","date":"2024-11-16T05:30:21"},{"date":"2025-02-08T05:03:18","version":"1.026"},{"date":"2025-03-02T10:22:16","version":"1.027"}],"advisories":[{"reviewed_by":[{"name":"Robert Rothenberg","email":"rrwo@cpan.org","date":"2022-06-23"}],"severity":"high","id":"CPANSA-Imager-2016-1238","cves":["CVE-2016-1238"],"reported":"2016-08-02","fixed_versions":[">=1.006"],"description":"Imager would search the default current directory entry in @INC when searching for file format support modules.\n","distribution":"Imager","references":["https://metacpan.org/dist/Imager/changes","http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"affected_versions":["<1.006"]},{"affected_versions":[">=0.42,<=0.63"],"references":["https://metacpan.org/dist/Imager/changes","http://rt.cpan.org/Public/Bug/Display.html?id=35324","http://imager.perl.org/i/release064/Imager_0_64","https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00569.html","http://www.securityfocus.com/bid/28980","http://secunia.com/advisories/30030","http://secunia.com/advisories/30011","http://www.vupen.com/english/advisories/2008/1387/references","https://exchange.xforce.ibmcloud.com/vulnerabilities/41986"],"id":"CPANSA-Imager-2008-1928","reported":"2008-04-24","fixed_versions":[">=0.64"],"cves":["CVE-2008-1928"],"description":"Buffer overflow in Imager 0.42 through 0.63 allows attackers to cause a denial of service (crash) via an image based fill in which the number of input channels is different from the number of output channels.\n","distribution":"Imager","severity":null,"reviewed_by":[{"date":"2022-06-23","email":"rrwo@cpan.org","name":"Robert Rothenberg"}]},{"severity":null,"reviewed_by":[{"name":"Robert Rothenberg","date":"2022-06-23","email":"rrwo@cpan.org"}],"affected_versions":[">=0.21,<=0.56"],"references":["http://imager.perl.org/a/65.html","http://rt.cpan.org/Public/Bug/Display.html?id=26811","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=421582","http://www.debian.org/security/2008/dsa-1498","http://www.securityfocus.com/bid/23711","http://secunia.com/advisories/25038","http://secunia.com/advisories/28868","http://osvdb.org/39846","http://www.vupen.com/english/advisories/2007/1587","http://osvdb.org/35470","https://exchange.xforce.ibmcloud.com/vulnerabilities/34010"],"id":"CPANSA-Imager-2007-2459","cves":["CVE-2007-2459"],"reported":"2007-05-02","fixed_versions":[">=0.57"],"distribution":"Imager","description":"Heap-based buffer overflow in the BMP reader (bmp.c) in Imager perl module (libimager-perl) 0.45 through 0.56 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted 8-bit/pixel compressed BMP files.\n"},{"severity":null,"affected_versions":["<0.98"],"references":["https://metacpan.org/dist/Imager/changes"],"id":"CPANSA-Imager-2014-01","reported":"2014-01-03","fixed_versions":[">=0.98"],"cves":[],"distribution":"Imager","description":"When drawing on an image with an alpha channel where the source minimum is greater than zero, Imager would read from beyond the end of a malloc() allocated buffer. In rare circumstances this could lead to some of the source image not being written to the target image, or possibly to a segmentation fault.\n"},{"fixed_versions":[">1.024"],"reported":"2024-11-17","cves":["CVE-2024-53901"],"description":"\"invalid next size\" backtrace on use of trim on certain images\n","distribution":"Imager","id":"CPANSA-Imager-2024-001","references":["https://metacpan.org/dist/Imager/changes","https://github.com/tonycoz/imager/issues/534"],"affected_versions":["<=1.024"],"severity":"moderate"},{"id":"CPANSA-Imager-2006-0053","distribution":"Imager","description":"Imager (libimager-perl) before 0.50 allows user-assisted attackers to cause a denial of service (segmentation fault) by writing a 2- or 4-channel JPEG image (or a 2-channel TGA image) to a scalar, which triggers a NULL pointer dereference.\n","cves":["CVE-2006-0053"],"reported":"2006-04-10","fixed_versions":[">=0.50"],"severity":null,"affected_versions":["<0.50"],"references":["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=359661","http://rt.cpan.org/Public/Bug/Display.html?id=18397","http://secunia.com/advisories/19575","http://secunia.com/advisories/19577","http://www.debian.org/security/2006/dsa-1028","http://www.securityfocus.com/bid/17415","http://www.vupen.com/english/advisories/2006/1294","https://exchange.xforce.ibmcloud.com/vulnerabilities/25717","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=359661","http://rt.cpan.org/Public/Bug/Display.html?id=18397","http://secunia.com/advisories/19575","http://secunia.com/advisories/19577","http://www.debian.org/security/2006/dsa-1028","http://www.securityfocus.com/bid/17415","http://www.vupen.com/english/advisories/2006/1294","https://exchange.xforce.ibmcloud.com/vulnerabilities/25717"]}]},"Sys-Syslog":{"versions":[{"date":"2005-12-06T22:19:29","version":"0.09"},{"version":"0.10","date":"2005-12-08T01:10:57"},{"date":"2005-12-27T23:49:31","version":"0.11"},{"date":"2006-01-07T04:07:20","version":"0.12"},{"version":"0.13","date":"2006-01-11T01:03:02"},{"date":"2006-05-25T22:42:27","version":"0.14"},{"version":"0.15","date":"2006-06-10T23:57:12"},{"version":"0.16","date":"2006-06-20T21:26:29"},{"date":"2006-07-23T01:51:16","version":"0.17"},{"date":"2006-08-28T22:18:29","version":"0.18"},{"version":"0.19","date":"2007-09-05T09:39:56"},{"version":"0.20","date":"2007-09-05T10:23:25"},{"version":"0.21","date":"2007-09-13T23:01:59"},{"version":"0.22","date":"2007-11-08T00:58:57"},{"version":"0.23","date":"2007-11-12T22:42:29"},{"date":"2007-12-31T17:18:56","version":"0.24"},{"date":"2008-06-05T23:16:19","version":"0.25"},{"date":"2008-06-15T23:49:12","version":"0.25"},{"version":"0.27","date":"2008-09-21T17:05:08"},{"date":"2009-03-14T03:24:36","version":"1.00"},{"version":"0.28","date":"2011-04-16T17:01:20"},{"version":"0.29","date":"2011-04-18T14:10:00"},{"date":"2012-08-15T01:27:23","version":"0.30"},{"version":"0.31","date":"2012-08-18T18:07:17"},{"version":"0.32","date":"2012-09-14T12:36:22"},{"date":"2013-05-24T00:13:07","version":"0.33"},{"version":"0.34","date":"2016-05-05T23:20:00"},{"version":"0.35","date":"2016-09-01T16:56:39"},{"date":"2019-10-21T22:41:02","version":"0.36"},{"perl_release":"5.000","dual_lived":1,"version":null,"date":"1994-10-17T00:00:00"},{"dual_lived":1,"version":"0.01","perl_release":"5.006000","date":"2000-03-22T00:00:00"},{"date":"2002-03-05T00:00:00","version":"0.02","dual_lived":1,"perl_release":"5.007003"},{"version":"0.03","dual_lived":1,"perl_release":"5.008000","date":"2002-07-19T00:00:00"},{"date":"2003-09-25T00:00:00","dual_lived":1,"version":"0.04","perl_release":"5.008001"},{"date":"2004-04-21T00:00:00","perl_release":"5.008004","dual_lived":1,"version":"0.05"},{"date":"2005-05-30T00:00:00","version":"0.06","dual_lived":1,"perl_release":"5.008007"},{"date":"2007-07-07T00:00:00","perl_release":"5.009005","version":"0.18_01","dual_lived":1},{"version":"0.33_01","dual_lived":1,"perl_release":"5.022003","date":"2017-01-14T00:00:00"},{"date":"2016-08-20T00:00:00","version":"0.34_01","dual_lived":1,"perl_release":"5.025004"}],"main_module":"Sys::Syslog","advisories":[{"reported":"2016-07-27","fixed_versions":[">=0.35"],"cves":["CVE-2016-1238"],"description":"Optional modules loaded from loading optional modules from \".\"\n","distribution":"Sys-Syslog","id":"CPANSA-Sys-Syslog-2016-1238","affected_versions":["<0.35"],"references":["https://metacpan.org/dist/Sys-Syslog/changes","https://rt.cpan.org/Public/Bug/Display.html?id=116543"],"severity":"high"}]},"Digest":{"main_module":"Digest","versions":[{"date":"2001-03-14T06:33:08","version":"1.00"},{"date":"2003-01-05T01:23:53","version":"1.01"},{"date":"2003-01-19T04:35:36","version":"1.02"},{"date":"2003-11-28T12:29:42","version":"1.03"},{"version":"1.04","date":"2003-11-29T12:08:20"},{"date":"2003-12-01T07:58:06","version":"1.05"},{"date":"2004-04-01T10:55:24","version":"1.06"},{"version":"1.07","date":"2004-04-25T14:39:53"},{"version":"1.08","date":"2004-04-29T07:56:42"},{"date":"2004-11-05T12:20:28","version":"1.09"},{"version":"1.10","date":"2004-11-08T09:41:14"},{"version":"1.11","date":"2005-09-11T11:14:33"},{"version":"1.12","date":"2005-09-29T10:20:20"},{"date":"2005-10-18T11:59:24","version":"1.13"},{"version":"1.14","date":"2005-11-26T10:10:21"},{"date":"2006-03-20T15:18:01","version":"1.15"},{"date":"2009-06-09T18:58:26","version":"1.16"},{"version":"1.17","date":"2011-10-02T10:14:32"},{"date":"2020-10-13T19:16:47","version":"1.18"},{"version":"1.19","date":"2020-10-13T20:02:35"},{"date":"2021-08-24T13:51:51","version":"1.20"},{"perl_release":"5.014003","dual_lived":1,"version":"1.16_01","date":"2012-10-12T00:00:00"},{"version":"1.17_01","dual_lived":1,"perl_release":"5.022003","date":"2017-01-14T00:00:00"}],"advisories":[{"distribution":"Digest","description":"Eval injection vulnerability in the Digest module before 1.17 for Perl allows context-dependent attackers to execute arbitrary commands via the new constructor.\n","fixed_versions":[">=0.17"],"reported":"2012-01-13","cves":["CVE-2011-3597"],"id":"CPANSA-Digest-2011-3597","references":["http://aix.software.ibm.com/aix/efixes/security/perl_advisory2.asc","http://www.redhat.com/support/errata/RHSA-2011-1797.html","http://www.redhat.com/support/errata/RHSA-2011-1424.html","https://bugzilla.redhat.com/show_bug.cgi?id=743010","http://www.securityfocus.com/bid/49911","http://secunia.com/advisories/46279","http://cpansearch.perl.org/src/GAAS/Digest-1.17/Changes","http://www.mandriva.com/security/advisories?name=MDVSA-2012:009","http://www.mandriva.com/security/advisories?name=MDVSA-2012:008","http://secunia.com/advisories/51457","http://www.ubuntu.com/usn/USN-1643-1","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19446"],"affected_versions":["<1.17"],"reviewed_by":[{"name":"Robert Rothenberg","date":"2022-07-05","email":"rrwo@cpan.org"}],"severity":null},{"severity":"high","affected_versions":["<1.19"],"references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"id":"CPANSA-Digest-2016-1238","distribution":"Digest","description":"Includes . in @INC which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","reported":"2016-08-02","cves":["CVE-2016-1238"],"fixed_versions":[">=1.19"]}]},"CGI-Application-Dispatch":{"advisories":[{"references":["https://metacpan.org/changes/distribution/CGI-Application-Dispatch"],"affected_versions":["<1.02"],"reported":"2005-01-20","cves":[],"fixed_versions":[">=1.02"],"distribution":"CGI-Application-Dispatch","description":"Untainted module names.\n","id":"CPANSA-CGI-Application-Dispatch-2005-001"}],"versions":[{"date":"2004-09-13T01:35:58","version":"0.01"},{"date":"2004-10-19T18:26:01","version":"0.02"},{"version":"0.03","date":"2004-10-29T16:53:40"},{"version":"1.00","date":"2005-01-06T15:34:49"},{"version":"1.01","date":"2005-01-08T12:42:00"},{"date":"2005-01-20T14:43:28","version":"1.02"},{"version":"1.03","date":"2005-03-04T16:28:16"},{"version":"1.04","date":"2005-07-12T21:44:54"},{"date":"2006-01-12T15:56:53","version":"2.00_02"},{"version":"2.00_03","date":"2006-02-06T15:50:52"},{"version":"2.00_04","date":"2006-02-14T15:41:25"},{"version":"2.00_05","date":"2006-04-12T14:18:22"},{"date":"2006-06-27T04:29:04","version":"2.00_06"},{"version":"2.00","date":"2006-07-03T15:52:12"},{"version":"2.01","date":"2006-08-14T14:14:10"},{"date":"2006-08-17T14:57:55","version":"2.02"},{"date":"2006-09-30T02:13:40","version":"2.03"},{"version":"2.10_01","date":"2007-01-03T18:12:57"},{"version":"2.10_02","date":"2007-01-11T18:55:41"},{"date":"2007-01-15T14:08:30","version":"2.10"},{"date":"2007-12-28T20:23:49","version":"2.11"},{"date":"2007-12-31T20:43:51","version":"2.12_01"},{"date":"2008-01-03T14:39:57","version":"2.12"},{"date":"2008-03-08T18:33:34","version":"2.13_01"},{"date":"2008-03-11T16:41:27","version":"2.13_02"},{"date":"2008-09-17T00:44:02","version":"2.13"},{"date":"2008-11-03T01:33:21","version":"2.14"},{"version":"2.15","date":"2008-12-04T16:00:05"},{"version":"2.16","date":"2009-03-24T02:03:51"},{"version":"2.17","date":"2009-12-30T19:06:27"},{"date":"2011-01-05T03:42:59","version":"2.18"},{"version":"3.00","date":"2011-06-16T17:42:14"},{"version":"3.01","date":"2011-06-24T02:53:20"},{"date":"2011-06-24T22:33:01","version":"3.02"},{"date":"2011-06-26T03:52:14","version":"3.03"},{"date":"2011-06-29T13:45:53","version":"3.04"},{"date":"2011-09-07T22:21:15","version":"3.05"},{"date":"2011-09-09T15:29:58","version":"3.06"},{"version":"3.07","date":"2011-09-09T17:32:11"},{"date":"2012-09-03T04:04:19","version":"3.10"},{"version":"3.11","date":"2012-09-14T01:02:58"},{"date":"2012-09-14T01:19:52","version":"3.12"}],"main_module":"CGI::Application::Dispatch"},"Net-Xero":{"main_module":"Net::Xero","versions":[{"version":"0.14","date":"2015-06-03T14:39:37"},{"version":"0.40","date":"2015-06-05T11:37:55"},{"date":"2015-06-05T11:49:29","version":"0.41"},{"version":"0.42","date":"2015-06-05T12:59:28"},{"date":"2015-06-05T14:09:46","version":"0.43"},{"version":"0.44","date":"2017-01-12T17:10:29"}],"advisories":[{"id":"CPANSA-Net-Xero-2024-56370","cves":["CVE-2024-56370"],"reported":"2025-04-05","fixed_versions":[],"description":"Net::Xero 0.044 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Net::Xero uses the Data::Random library which specifically states that it is \"Useful mostly for test programs\". Data::Random uses the rand() function.","distribution":"Net-Xero","severity":null,"affected_versions":[">0"],"references":["https://metacpan.org/release/BAREFOOT/Data-Random-0.13/source/lib/Data/Random.pm#L537","https://metacpan.org/release/ELLIOTT/Net-Xero-0.44/source/lib/Net/Xero.pm#L58","https://metacpan.org/release/ELLIOTT/Net-Xero-0.44/source/lib/Net/Xero.pm#L9","https://perldoc.perl.org/functions/rand","https://security.metacpan.org/docs/guides/random-data-for-security.html"]}]},"HTTP-Tiny":{"main_module":"HTTP::Tiny","versions":[{"date":"2010-12-11T12:59:31","version":"0.001"},{"date":"2010-12-14T02:59:37","version":"0.002"},{"date":"2010-12-15T17:30:49","version":"0.003"},{"date":"2010-12-16T03:53:33","version":"0.004"},{"date":"2011-01-08T11:32:21","version":"0.005"},{"date":"2011-01-10T12:27:39","version":"0.006"},{"version":"0.007","date":"2011-01-12T09:56:28"},{"date":"2011-01-14T11:34:51","version":"0.008"},{"version":"0.009","date":"2011-01-17T21:29:27"},{"version":"0.010","date":"2011-02-04T07:45:53"},{"version":"0.011","date":"2011-03-20T00:49:53"},{"date":"2011-03-31T19:49:33","version":"0.012"},{"version":"0.013","date":"2011-07-18T03:15:12"},{"version":"0.014","date":"2011-10-20T17:55:01"},{"version":"0.015","date":"2011-10-26T20:42:15"},{"date":"2011-10-27T03:06:06","version":"0.016"},{"date":"2012-02-23T02:58:42","version":"0.017"},{"version":"0.018","date":"2012-04-18T13:41:15"},{"version":"0.019","date":"2012-05-14T11:15:52"},{"date":"2012-05-14T19:25:57","version":"0.020"},{"version":"0.021","date":"2012-05-16T02:39:55"},{"version":"0.022","date":"2012-06-02T03:32:21"},{"version":"0.023","date":"2012-09-19T16:06:37"},{"version":"0.024","date":"2012-10-10T00:45:59"},{"date":"2012-12-26T17:11:23","version":"0.025"},{"date":"2013-03-05T03:54:12","version":"0.026"},{"date":"2013-03-05T17:04:07","version":"0.027"},{"date":"2013-03-05T19:13:42","version":"0.028"},{"version":"0.029","date":"2013-04-17T17:51:23"},{"version":"0.030","date":"2013-06-13T15:47:33"},{"version":"0.031","date":"2013-06-17T03:18:45"},{"date":"2013-06-20T15:42:26","version":"0.032"},{"date":"2013-06-21T10:27:45","version":"0.033"},{"date":"2013-06-26T23:03:50","version":"0.034"},{"date":"2013-09-10T16:30:04","version":"0.035"},{"date":"2013-09-25T16:11:04","version":"0.036"},{"date":"2013-10-28T17:50:02","version":"0.037"},{"date":"2013-11-18T17:57:17","version":"0.038"},{"version":"0.039","date":"2013-11-28T00:49:36"},{"date":"2014-02-17T18:05:10","version":"0.040"},{"version":"0.041","date":"2014-02-17T18:09:12"},{"date":"2014-02-18T16:24:50","version":"0.042"},{"date":"2014-02-21T01:42:05","version":"0.043"},{"version":"0.044","date":"2014-07-17T03:47:41"},{"version":"0.045","date":"2014-07-20T23:24:33"},{"version":"0.046","date":"2014-07-21T14:33:53"},{"date":"2014-07-29T18:13:01","version":"0.047"},{"version":"0.048","date":"2014-08-21T17:20:45"},{"date":"2014-09-02T15:21:17","version":"0.049"},{"date":"2014-09-23T19:32:00","version":"0.050"},{"version":"0.051","date":"2014-11-18T03:59:56"},{"date":"2014-12-11T20:25:19","version":"0.052"},{"version":"0.053","date":"2014-12-12T04:43:37"},{"version":"0.054","date":"2015-01-27T12:18:58"},{"date":"2015-05-07T22:15:24","version":"0.055"},{"date":"2015-05-19T10:01:27","version":"0.056"},{"version":"0.057","date":"2016-04-18T14:19:09"},{"version":"0.058","date":"2016-05-03T17:49:33"},{"version":"0.059","date":"2016-07-29T20:12:12"},{"version":"0.061","date":"2016-08-05T16:12:02"},{"date":"2016-08-08T16:20:33","version":"0.063"},{"version":"0.064","date":"2016-08-17T01:43:01"},{"version":"0.065","date":"2016-09-10T02:43:48"},{"version":"0.067","date":"2016-09-14T15:45:04"},{"date":"2016-09-23T20:15:05","version":"0.068"},{"date":"2016-10-05T15:37:11","version":"0.069"},{"version":"0.070","date":"2016-10-10T03:25:33"},{"date":"2018-07-24T15:35:02","version":"0.073"},{"date":"2018-07-30T19:37:29","version":"0.074"},{"version":"0.075","date":"2018-08-01T11:10:11"},{"version":"0.076","date":"2018-08-06T01:09:54"},{"version":"0.077","date":"2021-07-22T17:08:36"},{"version":"0.078","date":"2021-08-02T13:26:31"},{"date":"2021-11-04T16:34:59","version":"0.079"},{"date":"2021-11-05T12:17:42","version":"0.080"},{"version":"0.081","date":"2022-07-17T13:02:38"},{"version":"0.082","date":"2022-07-25T13:47:22"},{"version":"0.083","date":"2023-06-11T11:06:38"},{"date":"2023-06-14T10:35:44","version":"0.084"},{"date":"2023-06-22T14:07:29","version":"0.086"},{"date":"2023-07-11T12:54:02","version":"0.088"},{"date":"2024-10-21T07:38:21","version":"0.089"},{"version":"0.090","date":"2024-11-12T10:52:55"},{"dual_lived":1,"version":"0.054_01","perl_release":"5.022003","date":"2017-01-14T00:00:00"},{"date":"2017-01-14T00:00:00","version":"0.056_001","dual_lived":1,"perl_release":"5.024001"}],"advisories":[{"affected_versions":["<0.083"],"references":["https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/","https://github.com/chansen/p5-http-tiny/issues/152","https://github.com/chansen/p5-http-tiny/pull/151","https://hackeriet.github.io/cpan-http-tiny-overview/","https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/","https://github.com/NixOS/nixpkgs/pull/187480","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962407","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=954089","https://salsa.debian.org/perl-team/interpreter/perl/-/commit/1490431e40e22052f75a0b3449f1f53cbd27ba92.patch","https://github.com/chansen/p5-http-tiny/issues/134","https://github.com/chansen/p5-http-tiny/issues/68"],"id":"CPANSA-HTTP-Tiny-2023-31486","description":"HTTP::Tiny v0.082, a Perl core module since v5.13.9 and available standalone on CPAN, does not verify TLS certs by default. Users must opt-in with the verify_SSL=>1 flag to verify certs when using HTTPS.\nResulting in a CWE-1188: Insecure Default Initialization of Resource weakness.\n","distribution":"HTTP-Tiny","fixed_versions":[">=0.083"],"reported":"2023-02-14","cves":["CVE-2023-31486"]},{"reported":"2016-07-29","cves":["CVE-2016-1238"],"fixed_versions":[">=0.059"],"distribution":"HTTP-Tiny","description":"Loading modules from . (current directory).\n","id":"CPANSA-HTTP-Tiny-2016-1238","affected_versions":["<0.059"],"references":["https://metacpan.org/changes/distribution/HTTP-Tiny","https://github.com/chansen/p5-http-tiny/commit/b239c95ea7a256cfee9b8848f1bd4d1df6e66444"]},{"references":["https://metacpan.org/dist/HTTP-Tiny/changes"],"affected_versions":["<0.039"],"id":"CPANSA-HTTP-Tiny-2013-01","distribution":"HTTP-Tiny","description":"Temporary file creating during mirror() not opened exclusively.\n","reported":"2013-11-27","cves":[],"fixed_versions":[">=0.039"]}]},"Module-Signature":{"versions":[{"date":"2002-08-13T14:04:00","version":"0.02"},{"version":"0.03","date":"2002-08-13T15:48:18"},{"version":"0.04","date":"2002-08-14T08:03:45"},{"date":"2002-08-14T09:28:41","version":"0.05"},{"version":"0.06","date":"2002-10-10T15:22:33"},{"version":"0.07","date":"2002-10-11T04:16:01"},{"version":"0.08","date":"2002-10-11T19:32:19"},{"date":"2002-10-12T10:33:29","version":"0.09"},{"date":"2002-10-12T11:10:21","version":"0.10"},{"version":"0.11","date":"2002-10-12T19:23:48"},{"version":"0.12","date":"2002-10-12T22:55:54"},{"version":"0.13","date":"2002-10-13T05:22:45"},{"date":"2002-10-17T06:14:07","version":"0.14"},{"date":"2002-10-17T22:01:57","version":"0.15"},{"date":"2002-10-28T23:37:00","version":"0.16"},{"date":"2002-10-30T07:05:06","version":"0.17"},{"version":"0.18","date":"2002-11-04T15:08:41"},{"version":"0.19","date":"2002-11-04T15:13:45"},{"date":"2002-11-04T15:24:41","version":"0.20"},{"date":"2002-11-22T10:28:48","version":"0.21"},{"date":"2003-05-15T18:44:28","version":"0.23"},{"version":"0.24","date":"2003-07-08T02:49:57"},{"date":"2003-07-16T06:31:58","version":"0.25"},{"version":"0.26","date":"2003-07-17T14:03:19"},{"date":"2003-07-28T14:31:54","version":"0.27"},{"version":"0.28","date":"2003-07-29T15:30:55"},{"version":"0.29","date":"2003-08-08T02:54:01"},{"version":"0.30","date":"2003-08-10T13:35:38"},{"version":"0.31","date":"2003-08-10T17:17:19"},{"version":"0.32","date":"2003-08-11T09:15:13"},{"version":"0.33","date":"2003-08-12T04:11:59"},{"date":"2003-08-18T15:32:45","version":"0.34"},{"version":"0.35","date":"2003-08-27T07:08:31"},{"date":"2003-10-28T04:22:56","version":"0.36"},{"version":"0.37","date":"2003-11-06T10:55:07"},{"date":"2004-01-01T10:14:15","version":"0.38"},{"version":"0.39","date":"2004-06-17T15:17:14"},{"version":"0.40","date":"2004-07-01T12:18:17"},{"date":"2004-07-04T08:19:11","version":"0.41"},{"date":"2004-11-20T06:19:22","version":"0.42"},{"version":"0.43","date":"2004-12-16T06:45:55"},{"date":"2004-12-16T07:17:30","version":"0.44"},{"version":"0.45","date":"2005-08-09T04:23:46"},{"version":"0.50","date":"2005-08-21T08:16:22"},{"version":"0.51","date":"2006-01-01T18:41:57"},{"version":"0.52","date":"2006-01-18T16:32:37"},{"version":"0.53","date":"2006-01-31T05:02:24"},{"date":"2006-05-11T17:12:46","version":"0.54"},{"date":"2006-07-30T01:15:07","version":"0.55"},{"version":"0.60","date":"2009-11-16T14:59:35"},{"date":"2009-11-18T16:58:07","version":"0.61"},{"version":"0.62","date":"2010-03-23T21:21:37"},{"date":"2010-03-28T02:49:21","version":"0.62"},{"date":"2010-05-08T22:55:43","version":"0.62"},{"date":"2010-09-03T19:55:36","version":"0.65"},{"version":"0.66","date":"2010-09-06T20:58:24"},{"version":"0.67","date":"2011-04-17T15:09:22"},{"version":"0.68","date":"2011-05-13T09:55:20"},{"date":"2012-11-02T15:20:28","version":"0.69"},{"date":"2012-11-28T17:49:21","version":"0.70"},{"version":"0.71","date":"2013-06-04T10:29:18"},{"date":"2013-06-05T15:21:34","version":"0.72"},{"date":"2013-06-05T20:57:10","version":"0.73"},{"version":"0.74","date":"2015-04-06T18:39:32"},{"date":"2015-04-06T20:58:34","version":"0.75"},{"version":"0.76","date":"2015-04-08T10:13:11"},{"version":"0.77","date":"2015-04-08T11:47:26"},{"version":"0.78","date":"2015-04-09T09:00:30"},{"date":"2015-05-18T15:18:02","version":"0.79"},{"date":"2016-06-07T06:36:30","version":"0.80"},{"date":"2016-09-05T06:41:06","version":"0.81"},{"version":"0.81","date":"2018-08-26T15:19:13"},{"version":"0.83","date":"2018-08-29T08:35:25"},{"version":"0.84","date":"2020-06-25T13:01:10"},{"date":"2020-06-25T13:10:23","version":"0.86"},{"version":"0.87","date":"2020-07-04T07:16:32"},{"version":"0.87","date":"2021-12-18T03:39:32"},{"date":"2024-09-14T13:57:16","version":"0.89"},{"date":"2024-09-15T22:11:10","version":"0.89"}],"main_module":"Module::Signature","advisories":[{"reported":"2013-08-19","cves":["CVE-2013-2145"],"fixed_versions":[">=0.72"],"description":"The cpansign verify functionality in the Module::Signature module before 0.72 for Perl allows attackers to bypass the signature check and execute arbitrary code via a SIGNATURE file with a \"special unknown cipher\" that references an untrusted module in Digest/.\n","distribution":"Module-Signature","id":"CPANSA-Module-Signature-2013-01","affected_versions":["<0.72"],"references":["https://metacpan.org/changes/distribution/Module-Signature"]}]},"perl-ldap":{"advisories":[{"affected_versions":[">0"],"references":["https://lemonldap-ng.org/download","https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2250","https://rt.cpan.org/Ticket/Display.html?id=131045"],"severity":null,"reported":"2022-07-18","fixed_versions":[],"cves":["CVE-2020-16093"],"description":"In LemonLDAP::NG (aka lemonldap-ng) through 2.0.8, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used.\n","distribution":"perl-ldap","id":"CPANSA-Net-LDAPS-2020-16093"}],"versions":[{"version":"1.08","date":"1998-10-31T01:14:57"},{"date":"1998-10-31T01:19:38","version":"0.08"},{"version":"0.09","date":"1998-12-23T01:16:35"},{"version":"0.10","date":"1999-03-18T02:58:45"},{"date":"1999-04-18T22:10:20","version":"0.11"},{"date":"1999-06-28T02:40:38","version":"0.12"},{"date":"1999-08-15T23:27:41","version":"0.13"},{"date":"2000-02-14T10:34:19","version":"0.14"},{"date":"2000-03-22T10:46:21","version":"0.15"},{"date":"2000-04-27T17:02:43","version":"0.16"},{"version":"0.17","date":"2000-05-12T10:16:37"},{"version":"0.18","date":"2000-05-22T14:53:07"},{"version":"0.19","date":"2000-06-08T08:30:48"},{"version":"0.20","date":"2000-08-03T17:07:52"},{"version":"0.21","date":"2000-09-12T09:32:12"},{"version":"0.22","date":"2000-09-14T19:08:19"},{"date":"2001-04-19T23:25:47","version":"0.23"},{"version":"0.24","date":"2001-07-17T13:01:04"},{"version":"0.2401","date":"2001-08-25T08:15:47"},{"version":"0.25","date":"2001-10-29T17:35:12"},{"date":"2002-05-28T07:49:00","version":"0.251"},{"date":"2002-07-18T13:13:03","version":"0.26"},{"date":"2003-01-27T14:48:49","version":"0.27"},{"date":"2003-01-27T18:26:51","version":"0.2701"},{"date":"2003-05-19T22:40:30","version":"0.28"},{"version":"0.29","date":"2003-06-24T10:21:09"},{"date":"2003-10-17T21:42:36","version":"0.30"},{"version":"0.31","date":"2004-01-01T10:47:23"},{"date":"2004-07-01T15:59:03","version":"0.32"},{"version":"0.3201","date":"2004-07-14T21:00:39"},{"version":"0.3202","date":"2004-07-19T18:24:58"},{"version":"0.33","date":"2005-04-25T23:02:59"},{"version":"0.34","date":"2007-02-10T23:53:48"},{"date":"2008-03-30T18:58:37","version":"0.35"},{"version":"0.36","date":"2008-04-21T15:21:03"},{"date":"2008-08-28T13:02:29","version":"0.37"},{"version":"0.38","date":"2008-09-21T14:28:08"},{"version":"0.39","date":"2008-10-27T20:10:12"},{"date":"2010-03-12T03:03:48","version":"0.40"},{"date":"2010-03-24T20:01:45","version":"0.4001"},{"version":"0.41","date":"2011-09-03T12:44:01"},{"version":"0.42","date":"2011-09-03T12:48:31"},{"date":"2011-09-03T17:55:11","version":"0.43"},{"version":"0.44","date":"2012-01-29T09:55:22"},{"date":"2012-09-05T09:46:44","version":"0.45"},{"version":"0.46","date":"2012-09-05T16:17:53"},{"version":"0.47","date":"2012-09-16T10:06:08"},{"version":"0.48","date":"2012-09-20T08:58:48"},{"version":"0.49","date":"2012-10-06T08:15:30"},{"version":"0.50_01","date":"2012-11-17T17:10:16"},{"date":"2012-11-24T12:11:37","version":"0.50"},{"version":"0.51","date":"2012-12-01T13:39:38"},{"date":"2013-01-01T13:03:26","version":"0.52"},{"date":"2013-01-26T17:43:28","version":"0.53"},{"date":"2013-03-29T11:25:51","version":"0.54"},{"date":"2013-04-23T09:38:16","version":"0.55"},{"version":"0.56","date":"2013-06-08T11:31:48"},{"version":"0.57","date":"2013-07-21T17:04:36"},{"version":"0.58","date":"2013-12-23T16:50:28"},{"date":"2014-03-04T17:17:26","version":"0.59"},{"version":"0.60","date":"2014-03-08T13:14:49"},{"date":"2014-03-29T16:44:29","version":"0.61"},{"date":"2014-04-06T09:39:40","version":"0.62"},{"version":"0.63","date":"2014-06-01T10:58:37"},{"version":"0.64","date":"2014-06-19T15:59:40"},{"date":"2015-04-06T18:02:34","version":"0.65"},{"date":"2019-04-16T09:42:54","version":"0.66"},{"date":"2020-12-26T14:37:52","version":"0.67"},{"date":"2021-01-03T17:37:50","version":"0.68"}],"main_module":"Net::LDAP"},"Net-OAuth":{"versions":[{"date":"2007-09-30T14:22:46","version":"0.01"},{"version":"0.02","date":"2007-10-02T07:37:48"},{"version":"0.03","date":"2007-10-15T01:37:47"},{"version":"0.04","date":"2007-10-19T16:49:05"},{"version":"0.05","date":"2007-11-19T03:34:37"},{"version":"0.06","date":"2008-03-08T00:52:34"},{"version":"0.07","date":"2008-06-01T16:10:24"},{"date":"2008-06-02T17:46:32","version":"0.08"},{"date":"2008-06-03T03:48:14","version":"0.09"},{"version":"0.1","date":"2008-06-04T16:32:57"},{"version":"0.11","date":"2008-06-04T16:52:05"},{"version":"0.12","date":"2008-07-04T23:04:35"},{"version":"0.13","date":"2008-11-13T22:55:38"},{"date":"2008-12-13T17:32:02","version":"0.14"},{"version":"0.15","date":"2009-06-05T01:27:05"},{"date":"2009-06-15T18:40:40","version":"0.16"},{"version":"0.17","date":"2009-06-25T17:05:32"},{"version":"0.18","date":"2009-06-25T17:21:13"},{"date":"2009-06-26T17:37:04","version":"0.19"},{"version":"0.20","date":"2009-11-13T19:04:23"},{"version":"0.21","date":"2010-03-10T23:07:13"},{"version":"0.22","date":"2010-03-11T00:25:24"},{"date":"2010-03-18T17:53:01","version":"0.23"},{"version":"0.24","date":"2010-03-21T03:44:38"},{"date":"2010-03-21T03:53:29","version":"0.25"},{"date":"2010-06-16T20:08:26","version":"0.26"},{"date":"2010-06-16T20:47:49","version":"0.27"},{"date":"2012-01-06T06:08:03","version":"0.28"},{"version":"0.29","date":"2025-01-03T09:18:44"},{"date":"2025-01-03T09:48:29","version":"0.30"},{"date":"2025-04-03T16:00:58","version":"0.31"}],"main_module":"Net::OAuth","advisories":[{"id":"CPANSA-Net-OAuth-2025-22376","reported":"2025-01-03","cves":["CVE-2025-22376"],"fixed_versions":[">=0.29"],"distribution":"Net-OAuth","description":"In Net::OAuth::Client in the Net::OAuth package before 0.29 for Perl, the default nonce is a 32-bit integer generated from the built-in rand() function, which is not cryptographically strong.\n","severity":"high","affected_versions":["<0.29"],"references":["https://metacpan.org/release/KGRENNAN/Net-OAuth-0.28/source/lib/Net/OAuth/Client.pm#L260","https://metacpan.org/release/RRWO/Net-OAuth-0.29/changes"]}]},"Email-MIME":{"main_module":"Email::MIME","versions":[{"version":"1.0_01","date":"2004-01-23T12:04:54"},{"version":"1.1","date":"2004-03-24T16:01:33"},{"date":"2004-04-02T08:52:35","version":"1.2"},{"version":"1.3","date":"2004-04-05T16:27:42"},{"version":"1.4","date":"2004-07-01T17:38:00"},{"date":"2004-07-01T17:40:06","version":"1.5"},{"date":"2004-07-04T20:17:06","version":"1.6"},{"date":"2004-07-05T21:56:19","version":"1.7"},{"version":"1.8","date":"2004-08-25T09:58:28"},{"version":"1.81","date":"2004-10-30T00:19:03"},{"version":"1.82","date":"2004-11-18T01:02:46"},{"date":"2006-07-13T12:09:00","version":"1.85"},{"date":"2006-08-22T12:15:01","version":"1.851"},{"version":"1.852","date":"2006-09-06T03:22:24"},{"version":"1.853","date":"2006-10-12T19:23:59"},{"date":"2006-10-15T12:57:06","version":"1.854"},{"date":"2006-10-19T19:26:56","version":"1.855"},{"date":"2006-11-28T01:54:55","version":"1.856"},{"date":"2006-11-28T02:45:42","version":"1.857"},{"version":"1.858","date":"2007-02-10T03:53:13"},{"version":"1.859","date":"2007-03-21T02:13:51"},{"version":"1.860","date":"2007-07-14T02:17:11"},{"version":"1.861","date":"2007-11-06T02:03:23"},{"version":"1.861_01","date":"2008-09-08T22:24:06"},{"date":"2009-01-24T03:09:24","version":"1.862"},{"date":"2009-01-30T13:35:20","version":"1.863"},{"date":"2009-11-03T20:49:02","version":"1.900"},{"version":"1.901","date":"2009-11-05T19:29:16"},{"version":"1.902","date":"2009-11-11T20:53:15"},{"date":"2009-12-23T14:14:45","version":"1.903"},{"version":"1.904","date":"2010-09-04T22:05:49"},{"version":"1.905","date":"2010-09-06T13:25:51"},{"date":"2010-10-08T01:06:33","version":"1.906"},{"version":"1.907","date":"2011-02-02T22:52:42"},{"date":"2011-06-02T03:16:50","version":"1.908"},{"version":"1.909","date":"2011-09-08T19:27:38"},{"date":"2011-09-12T16:45:52","version":"1.910"},{"date":"2012-07-22T23:12:42","version":"1.911"},{"date":"2013-04-08T19:42:09","version":"1.912_01"},{"date":"2013-06-17T15:24:37","version":"1.920"},{"version":"1.921","date":"2013-07-02T02:51:36"},{"version":"1.922","date":"2013-07-10T12:45:29"},{"version":"1.923","date":"2013-08-09T02:00:30"},{"date":"2013-08-11T03:25:40","version":"1.924"},{"version":"1.925","date":"2013-11-08T12:02:21"},{"date":"2014-01-29T04:29:29","version":"1.926"},{"date":"2014-12-04T15:22:49","version":"1.927"},{"date":"2014-12-16T02:49:06","version":"1.928"},{"version":"1.929","date":"2015-02-17T14:32:33"},{"date":"2015-03-26T03:00:09","version":"1.930"},{"date":"2015-07-12T21:32:56","version":"1.931"},{"date":"2015-07-25T02:25:32","version":"1.932"},{"date":"2015-07-25T13:33:07","version":"1.933"},{"date":"2015-08-02T00:35:40","version":"1.934"},{"version":"1.935","date":"2015-08-31T20:49:57"},{"version":"1.936","date":"2015-09-11T02:48:33"},{"version":"1.937","date":"2016-01-28T18:33:58"},{"version":"1.938","date":"2017-01-02T01:04:29"},{"date":"2017-01-14T19:59:46","version":"1.939"},{"version":"1.940","date":"2017-01-29T15:34:49"},{"date":"2017-03-05T00:18:30","version":"1.941"},{"date":"2017-03-05T13:16:39","version":"1.942"},{"version":"1.943","date":"2017-06-09T23:01:41"},{"date":"2017-07-25T16:40:42","version":"1.944"},{"date":"2017-07-25T18:18:48","version":"1.945"},{"version":"1.946","date":"2017-08-31T13:31:14"},{"date":"2020-05-09T18:30:39","version":"1.947"},{"date":"2020-05-09T19:06:22","version":"1.948"},{"version":"1.949","date":"2020-05-24T14:27:02"},{"date":"2020-11-03T00:22:52","version":"1.950"},{"date":"2021-12-14T14:43:29","version":"1.951"},{"version":"1.952","date":"2021-12-14T14:58:13"},{"date":"2023-01-09T00:03:49","version":"1.953"},{"version":"1.954","date":"2024-05-02T21:13:55"}],"advisories":[{"severity":null,"affected_versions":["<1.954"],"references":["https://bugs.debian.org/960062","https://github.com/rjbs/Email-MIME/commit/02bf3e26812c8f38a86a33c168571f9783365df2","https://github.com/rjbs/Email-MIME/commit/3a12edd119e493156a5a05e45dd50f4e36b702e8","https://github.com/rjbs/Email-MIME/commit/3dcf096eeccb8e4dd42738de676c8f4a5aa7a531","https://github.com/rjbs/Email-MIME/commit/7e96ecfa1da44914a407f82ae98ba817bba08f2d","https://github.com/rjbs/Email-MIME/commit/b2cb62f19e12580dd235f79e2546d44a6bec54d1","https://github.com/rjbs/Email-MIME/commit/fc0fededd24a71ccc51bcd8b1e486385d09aae63","https://github.com/rjbs/Email-MIME/issues/66","https://github.com/rjbs/Email-MIME/pull/80","https://www.cve.org/CVERecord?id=CVE-2024-4140"],"id":"CPANSA-Email-MIME-2024-4140","reported":"2024-05-02","cves":["CVE-2024-4140"],"fixed_versions":[">=1.954"],"description":"An excessive memory use issue (CWE-770) exists in Email-MIME, before version 1.954, which can cause denial of service when parsing multipart MIME messages. The patch set (from 2020 and 2024) limits excessive depth and the total number of parts.\n","distribution":"Email-MIME"}]},"Cpanel-JSON-XS":{"advisories":[{"references":["https://metacpan.org/changes/distribution/Cpanel-JSON-XS","https://github.com/rurban/Cpanel-JSON-XS/commit/f71768984ba7f50b0476c17a4f3b3f2ca88a6951","https://github.com/dankogai/p5-encode/issues/64"],"affected_versions":["<3.0225"],"cves":[],"reported":"2016-11-23","fixed_versions":[">=3.0225"],"distribution":"Cpanel-JSON-XS","description":"Overflow during processing of ill-formed UTF-8 strings.\n","id":"CPANSA-Cpanel-JSON-XS-2016-02"},{"references":["https://metacpan.org/changes/distribution/Cpanel-JSON-XS","https://github.com/rurban/Cpanel-JSON-XS/commit/6554531b39fac236321d8601d35eaaa75ae45e20"],"affected_versions":["<3.0218"],"reported":null,"fixed_versions":[">=3.0218"],"cves":[],"distribution":"Cpanel-JSON-XS","description":"Possible overflows in av and hv length types.\n","id":"CPANSA-Cpanel-JSON-XS-2016-01"},{"id":"CPANSA-Cpanel-JSON-XS-2023-01","fixed_versions":[">=4.033"],"reported":"2023-02-21","cves":["CVE-2022-48623"],"description":"Wrong error messages/sometimes crashes or endless loops with invalid JSON in relaxed mode\n","distribution":"Cpanel-JSON-XS","affected_versions":["<4.033"],"references":["https://metacpan.org/changes/distribution/Cpanel-JSON-XS","https://github.com/rurban/Cpanel-JSON-XS/issues/208","https://metacpan.org/release/RURBAN/Cpanel-JSON-XS-4.33/changes","https://nvd.nist.gov/vuln/detail/CVE-2022-48623","https://github.com/rurban/Cpanel-JSON-XS/commit/41f32396eee9395a40f9ed80145c37622560de9b","https://github.com/advisories/GHSA-44qr-8pf6-6q33"]}],"versions":[{"version":"2.33_03","date":"2013-03-01T00:52:41"},{"date":"2013-03-01T22:07:06","version":"2.33_04"},{"version":"2.3305","date":"2013-03-27T16:53:34"},{"date":"2013-03-27T17:17:51","version":"2.3306"},{"date":"2013-03-27T22:58:47","version":"2.3307"},{"version":"2.3308","date":"2013-03-28T14:28:56"},{"date":"2013-03-28T15:12:42","version":"2.3309"},{"version":"2.3310","date":"2013-03-28T17:33:21"},{"version":"2.3313","date":"2013-06-26T16:24:40"},{"version":"2.3314","date":"2013-09-09T05:54:40"},{"version":"2.3401","date":"2013-10-02T20:06:47"},{"date":"2013-11-02T14:42:20","version":"2.3402"},{"date":"2013-11-02T15:17:41","version":"2.3403"},{"date":"2014-01-30T15:58:58","version":"2.3404"},{"version":"3.0101","date":"2014-04-15T21:17:11"},{"date":"2014-04-17T18:37:34","version":"3.0102"},{"version":"3.0103","date":"2014-04-21T17:49:09"},{"date":"2014-04-26T16:04:39","version":"3.0104"},{"version":"3.0105","date":"2014-11-06T10:38:31"},{"version":"3.0106","date":"2014-11-11T21:57:49"},{"version":"3.0107","date":"2014-11-28T12:16:29"},{"version":"3.0108","date":"2014-12-11T17:02:07"},{"date":"2014-12-12T10:24:33","version":"3.0109"},{"version":"3.0110","date":"2014-12-12T22:35:37"},{"version":"3.0111","date":"2014-12-13T18:40:06"},{"version":"3.0112","date":"2014-12-14T16:34:01"},{"version":"3.0113","date":"2014-12-15T12:23:32"},{"date":"2015-01-04T14:06:03","version":"3.0114"},{"version":"3.0115","date":"2015-01-31T21:42:51"},{"version":"3.0201","date":"2015-11-26T08:58:33"},{"version":"3.0202","date":"2015-11-26T13:16:40"},{"date":"2015-11-26T13:42:02","version":"3.0203"},{"version":"3.0204","date":"2015-11-26T22:30:26"},{"version":"3.0205","date":"2015-11-29T14:09:00"},{"date":"2015-11-30T16:16:48","version":"3.0206"},{"version":"3.0207","date":"2015-12-02T16:34:35"},{"version":"3.0208","date":"2015-12-02T22:46:58"},{"date":"2015-12-03T09:45:04","version":"3.0209"},{"version":"3.0210","date":"2015-12-03T11:59:24"},{"version":"3.0211","date":"2016-01-10T17:38:25"},{"version":"3.0212","date":"2016-02-27T13:30:04"},{"date":"2016-03-02T10:28:37","version":"3.0213"},{"version":"3.0213_01","date":"2016-04-12T08:40:05"},{"date":"2016-04-13T10:40:03","version":"3.0213_02"},{"version":"3.0214","date":"2016-06-02T16:18:51"},{"version":"3.0215","date":"2016-06-06T13:28:49"},{"date":"2016-06-12T12:14:20","version":"3.0216"},{"version":"3.0217","date":"2016-06-18T09:59:27"},{"version":"3.0217_01","date":"2016-10-04T10:11:33"},{"version":"3.0217_02","date":"2016-10-04T14:47:29"},{"date":"2016-10-06T08:46:17","version":"3.0217_03"},{"version":"3.0217_04","date":"2016-10-07T12:11:03"},{"date":"2016-10-07T17:22:48","version":"3.0217_05"},{"date":"2016-10-08T08:01:50","version":"3.0217_06"},{"version":"3.0218","date":"2016-10-13T12:47:31"},{"version":"3.0219","date":"2016-10-26T11:45:35"},{"version":"3.0220","date":"2016-10-28T08:34:28"},{"date":"2016-10-30T12:27:36","version":"3.0221"},{"version":"3.0222","date":"2016-10-30T15:04:32"},{"date":"2016-11-16T11:47:38","version":"3.0223"},{"version":"3.0224","date":"2016-11-20T11:31:34"},{"version":"3.0225","date":"2016-11-23T18:43:00"},{"version":"3.0226","date":"2017-02-11T13:24:48"},{"version":"3.0227","date":"2017-02-13T10:57:06"},{"date":"2017-03-07T23:57:39","version":"3.0228"},{"version":"3.0229","date":"2017-03-10T14:08:07"},{"version":"3.0230","date":"2017-03-12T09:52:13"},{"version":"3.0231","date":"2017-03-29T09:51:51"},{"date":"2017-05-01T05:35:12","version":"3.0232"},{"date":"2017-05-01T14:54:56","version":"3.0233"},{"date":"2017-07-27T15:43:41","version":"3.0234"},{"version":"3.0235","date":"2017-07-27T16:21:47"},{"version":"3.0236","date":"2017-07-27T20:15:25"},{"version":"3.0237","date":"2017-07-28T11:15:05"},{"version":"3.0238","date":"2017-08-25T20:53:56"},{"version":"3.0239","date":"2017-08-28T20:48:37"},{"version":"3.99_01","date":"2018-01-30T11:52:27"},{"version":"3.99_02","date":"2018-01-31T12:58:24"},{"date":"2018-01-31T17:18:58","version":"3.99_03"},{"date":"2018-02-02T01:57:54","version":"4.00"},{"date":"2018-02-03T11:50:36","version":"4.01"},{"date":"2018-02-27T16:08:55","version":"4.02"},{"version":"4.03","date":"2018-06-21T11:16:14"},{"date":"2018-06-22T17:37:07","version":"4.04"},{"date":"2018-08-19T16:55:22","version":"4.05"},{"version":"4.06","date":"2018-08-23T07:50:22"},{"date":"2018-11-02T09:51:34","version":"4.07"},{"date":"2018-11-28T14:26:40","version":"4.08"},{"version":"4.09","date":"2019-02-15T10:09:53"},{"version":"4.10","date":"2019-03-18T07:50:15"},{"date":"2019-03-26T16:46:53","version":"4.11"},{"date":"2019-06-11T08:04:04","version":"4.12"},{"date":"2019-10-14T14:14:37","version":"4.13"},{"version":"4.14","date":"2019-10-15T15:16:21"},{"date":"2019-10-22T07:01:03","version":"4.15"},{"date":"2019-11-04T15:51:01","version":"4.16"},{"date":"2019-11-05T13:48:29","version":"4.17"},{"version":"4.18","date":"2019-12-13T15:54:58"},{"date":"2020-02-06T15:07:47","version":"4.19"},{"date":"2020-08-12T12:18:46","version":"4.20"},{"version":"4.21","date":"2020-08-13T06:56:18"},{"version":"4.22","date":"2020-09-04T19:26:28"},{"version":"4.23","date":"2020-09-05T10:21:25"},{"date":"2020-10-02T09:05:37","version":"4.24"},{"date":"2020-10-28T07:04:49","version":"4.25"},{"date":"2021-04-12T06:34:32","version":"4.26"},{"version":"4.27","date":"2021-10-14T19:19:01"},{"version":"4.28","date":"2022-05-05T14:46:07"},{"date":"2022-05-27T15:32:51","version":"4.29"},{"date":"2022-06-16T19:19:38","version":"4.30"},{"date":"2022-08-10T14:25:08","version":"4.31"},{"date":"2022-08-13T07:13:40","version":"4.32"},{"date":"2023-02-21T16:34:10","version":"4.33"},{"version":"4.34","date":"2023-02-21T18:39:09"},{"version":"4.35","date":"2023-02-22T15:40:53"},{"version":"4.36","date":"2023-03-02T15:11:52"},{"date":"2023-07-04T10:35:53","version":"4.37"},{"version":"4.38","date":"2024-05-28T07:42:37"},{"version":"4.39","date":"2024-12-12T21:17:16"}],"main_module":"Cpanel::JSON::XS"},"Locale-Maketext":{"versions":[{"version":"0.17","date":"1999-03-16T05:22:44"},{"version":"0.18","date":"2000-05-14T08:26:33"},{"date":"2001-05-25T14:21:01","version":"1.01"},{"date":"2001-06-20T08:28:48","version":"1.02"},{"date":"2001-06-22T05:27:18","version":"1.03"},{"version":"1.04","date":"2003-04-02T20:20:43"},{"date":"2003-04-19T06:11:36","version":"1.05"},{"version":"1.06","date":"2003-06-22T07:51:14"},{"date":"2004-01-12T04:18:16","version":"1.07"},{"version":"1.08","date":"2004-01-20T00:14:54"},{"version":"1.09","date":"2004-03-31T06:47:07"},{"version":"1.10","date":"2005-11-11T03:42:57"},{"date":"2007-05-08T05:03:08","version":"1.11_01"},{"date":"2007-11-18T05:22:03","version":"1.12"},{"date":"2008-05-28T15:01:40","version":"1.13"},{"version":"1.13_80","date":"2009-06-23T18:13:14"},{"version":"1.13_81","date":"2009-06-24T00:22:21"},{"date":"2009-06-24T02:33:08","version":"1.13_82"},{"date":"2010-09-28T22:59:25","version":"1.15_01"},{"date":"2010-10-07T14:12:19","version":"1.15_02"},{"version":"1.16","date":"2010-10-11T18:07:07"},{"date":"2010-10-20T15:54:47","version":"1.16_01"},{"version":"1.17","date":"2010-10-20T18:42:13"},{"version":"1.18_01","date":"2011-05-25T15:44:55"},{"version":"1.19","date":"2011-05-31T19:29:50"},{"date":"2011-12-15T04:02:22","version":"1.19_01"},{"date":"2011-12-23T15:18:14","version":"1.21"},{"version":"1.22","date":"2012-01-15T05:02:24"},{"date":"2012-12-04T21:29:08","version":"1.23"},{"version":"1.25_01","date":"2014-04-14T03:15:07"},{"date":"2014-04-15T20:10:23","version":"1.25"},{"date":"2014-12-04T20:57:02","version":"1.26"},{"version":"1.27","date":"2016-06-22T23:30:00"},{"version":"1.28","date":"2016-07-25T17:57:25"},{"date":"2020-01-20T05:04:23","version":"1.29"},{"version":"1.30","date":"2022-04-01T19:18:30"},{"date":"2022-04-14T21:18:43","version":"1.31"},{"version":"1.32","date":"2022-08-22T19:20:51"},{"date":"2023-12-30T21:23:51","version":"1.33"},{"version":"1.10_01","dual_lived":1,"perl_release":"5.009003","date":"2006-01-28T00:00:00"},{"date":"2009-11-20T00:00:00","perl_release":"5.011002","dual_lived":1,"version":"1.14"},{"perl_release":"5.013003","version":"1.15","dual_lived":1,"date":"2010-07-20T00:00:00"},{"dual_lived":1,"version":"1.18","perl_release":"5.013009","date":"2011-01-20T00:00:00"},{"perl_release":"5.015005","version":"1.20","dual_lived":1,"date":"2011-11-20T00:00:00"},{"date":"2013-06-21T00:00:00","perl_release":"5.019001","version":"1.24","dual_lived":1},{"perl_release":"5.022003","dual_lived":1,"version":"1.26_01","date":"2017-01-14T00:00:00"}],"main_module":"Locale::Maketext","advisories":[{"severity":null,"references":["http://perl5.git.perl.org/perl.git/commit/1735f6f53ca19f99c6e9e39496c486af323ba6a8","http://sourceforge.net/mailarchive/message.php?msg_id=30219695","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695224","http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2012-6329","http://perl5.git.perl.org/perl.git/blob/HEAD:/pod/perl5177delta.pod","http://openwall.com/lists/oss-security/2012/12/11/4","http://code.activestate.com/lists/perl5-porters/187763/","http://code.activestate.com/lists/perl5-porters/187746/","https://bugzilla.redhat.com/show_bug.cgi?id=884354","http://rhn.redhat.com/errata/RHSA-2013-0685.html","http://www.mandriva.com/security/advisories?name=MDVSA-2013:113","https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0032","http://www.ubuntu.com/usn/USN-2099-1","http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","http://www.securityfocus.com/bid/56950","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"],"affected_versions":["<1.25"],"id":"CPANSA-Locale-Maketext-2012-6329","distribution":"Locale-Maketext","description":"The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6.\n","fixed_versions":[],"reported":"2013-01-04","cves":["CVE-2012-6329"]},{"id":"CPANSA-Locale-Maketext-2016-1238","distribution":"Locale-Maketext","description":"Does not remove . from @INC, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","reported":"2016-08-02","fixed_versions":[">=1.28"],"cves":["CVE-2016-1238"],"severity":"high","references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"affected_versions":["<1.28"]}]},"Plack-Middleware-Session":{"versions":[{"date":"2009-12-15T18:59:13","version":"0.01"},{"date":"2009-12-19T19:27:38","version":"0.02"},{"date":"2010-01-07T22:12:43","version":"0.03"},{"version":"0.09_01","date":"2010-01-30T21:46:53"},{"date":"2010-01-31T07:17:07","version":"0.09_02"},{"version":"0.09_03","date":"2010-02-03T04:46:20"},{"date":"2010-02-23T03:16:31","version":"0.10"},{"date":"2010-02-27T10:47:17","version":"0.11"},{"date":"2010-07-07T22:55:18","version":"0.12"},{"version":"0.13","date":"2010-12-22T17:00:14"},{"date":"2011-03-29T20:50:06","version":"0.14"},{"version":"0.15","date":"2012-09-04T21:16:35"},{"date":"2013-02-10T19:43:11","version":"0.16"},{"version":"0.17","date":"2013-02-11T23:45:49"},{"version":"0.17","date":"2013-02-12T10:57:14"},{"date":"2013-06-24T23:09:39","version":"0.20"},{"version":"0.21","date":"2013-10-12T18:42:26"},{"version":"0.22","date":"2014-08-11T17:18:03"},{"date":"2014-08-11T17:23:40","version":"0.23"},{"version":"0.24","date":"2014-09-05T11:48:57"},{"version":"0.25","date":"2014-09-29T03:07:54"},{"version":"0.26","date":"2015-02-03T08:17:55"},{"date":"2015-02-14T00:52:35","version":"0.27"},{"version":"0.28","date":"2015-02-16T16:30:31"},{"date":"2015-02-17T23:57:32","version":"0.29"},{"date":"2015-03-02T18:25:56","version":"0.30"},{"version":"0.31","date":"2019-02-26T19:01:59"},{"date":"2019-02-26T21:36:43","version":"0.32"},{"version":"0.33","date":"2019-03-09T23:19:27"},{"date":"2024-09-23T16:54:44","version":"0.34"}],"main_module":"Plack::Middleware::Session","advisories":[{"severity":"critical","affected_versions":["<=0.21"],"references":["https://gist.github.com/miyagawa/2b8764af908a0dacd43d","https://metacpan.org/changes/distribution/Plack-Middleware-Session"],"id":"CPANSA-Plack-Middleware-Session-2014-01","cves":[],"reported":"2014-08-11","fixed_versions":[">0.21"],"description":"Plack::Middleware::Session::Cookie 0.21 has a security vulnerability where it allows an attacker to execute arbitrary code on the server, when the middleware is enabled without a secret.\n","distribution":"Plack-Middleware-Session"}]},"Data-Entropy":{"advisories":[{"severity":null,"affected_versions":["<=0.007"],"references":["https://metacpan.org/release/ZEFRAM/Data-Entropy-0.007/source/lib/Data/Entropy.pm#L80","https://perldoc.perl.org/functions/rand","https://lists.debian.org/debian-lts-announce/2025/03/msg00026.html"],"id":"CPANSA-Data-Entropy-2025-1860","description":"Data::Entropy for Perl 0.007 and earlier use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.","distribution":"Data-Entropy","reported":"2025-03-28","fixed_versions":[">0.007"],"cves":["CVE-2025-1860"]}],"versions":[{"version":"0.000","date":"2006-07-19T01:09:30"},{"version":"0.001","date":"2006-08-03T20:27:12"},{"date":"2006-08-05T09:15:08","version":"0.002"},{"version":"0.003","date":"2007-01-21T00:51:31"},{"version":"0.004","date":"2007-09-03T21:25:09"},{"date":"2009-03-03T20:31:03","version":"0.005"},{"date":"2009-11-21T14:01:52","version":"0.006"},{"date":"2011-04-27T20:03:17","version":"0.007"},{"version":"0.008","date":"2025-03-27T19:11:37"}],"main_module":"Data::Entropy"},"Graphics-ColorNames":{"versions":[{"date":"2001-02-20T03:47:48","version":"0.10"},{"version":"0.20","date":"2001-04-12T02:32:22"},{"date":"2001-04-13T04:37:27","version":"0.21"},{"date":"2001-04-15T14:26:41","version":"0.22"},{"version":"0.23","date":"2001-04-18T03:13:51"},{"date":"2001-04-28T16:09:48","version":"0.24"},{"version":"0.30","date":"2001-10-05T02:42:20"},{"date":"2002-10-24T01:17:51","version":"0.31"},{"date":"2002-12-05T03:07:24","version":"0.32"},{"version":"0.3901","date":"2004-07-22T00:41:35"},{"version":"0.39_02","date":"2004-07-22T20:01:47"},{"date":"2004-07-23T01:52:58","version":"0.39_03"},{"date":"2004-07-26T06:36:47","version":"0.39_04"},{"date":"2004-08-01T01:21:33","version":"1.00"},{"version":"1.01","date":"2004-08-18T20:32:07"},{"date":"2004-08-24T15:53:20","version":"1.02"},{"date":"2004-08-26T21:51:46","version":"1.03"},{"version":"1.04","date":"2004-09-03T06:56:23"},{"version":"1.05","date":"2004-09-03T07:00:16"},{"date":"2005-03-29T23:06:41","version":"1.06"},{"version":"2.0_01","date":"2005-04-04T15:17:24"},{"version":"2.0_02","date":"2005-04-07T16:08:52"},{"date":"2005-04-08T16:48:24","version":"2.0_03"},{"date":"2006-10-24T13:58:29","version":"2.0_04"},{"version":"2.01","date":"2007-12-16T15:33:27"},{"date":"2007-12-16T16:04:00","version":"2.02"},{"date":"2007-12-17T12:49:37","version":"2.03"},{"date":"2007-12-17T20:01:53","version":"2.04"},{"date":"2007-12-20T16:01:35","version":"2.10_01"},{"date":"2008-01-04T15:55:53","version":"2.10_02"},{"version":"2.10_03","date":"2008-01-05T13:14:32"},{"date":"2008-01-06T21:52:18","version":"2.10_04"},{"version":"2.10_05","date":"2008-01-08T16:20:38"},{"version":"2.11","date":"2008-01-10T21:43:53"},{"version":"v3.0.0","date":"2018-09-27T23:02:17"},{"version":"v3.0.1","date":"2018-09-28T12:40:06"},{"version":"v3.0.2","date":"2018-09-28T16:56:39"},{"version":"v3.1.0","date":"2018-09-30T12:37:45"},{"version":"v3.1.1","date":"2018-10-01T16:51:16"},{"date":"2018-10-01T22:15:39","version":"v3.1.2"},{"version":"v3.2.0","date":"2018-10-03T23:36:26"},{"version":"v3.2.1","date":"2018-10-06T10:00:38"},{"date":"2018-10-23T20:30:22","version":"v3.3.0"},{"version":"v3.3.1","date":"2018-10-24T15:03:58"},{"version":"v3.3.2","date":"2018-10-27T16:33:30"},{"date":"2018-10-27T18:31:44","version":"v3.3.3"},{"version":"v3.3.4","date":"2018-11-11T15:13:51"},{"version":"v3.4.0","date":"2018-11-18T19:13:42"},{"version":"v3.5.0","date":"2019-06-06T20:30:43"}],"main_module":"Graphics::ColorNames","advisories":[{"affected_versions":[">=2.0_01,<=3.1.2"],"references":["https://metacpan.org/changes/distribution/Graphics-ColorNames","https://rt.cpan.org/Public/Bug/Display.html?id=54500"],"id":"CPANSA-Graphics-ColorNames-2010-02","description":"A specially-named file may lead to HTML injection attacks.\n","distribution":"Graphics-ColorNames","reported":"2010-02-11","fixed_versions":[">3.1.2"],"cves":["CVE-2024-55918"]}]},"Net-SSLeay":{"main_module":"Net::SSLeay","versions":[{"date":"2007-07-03T14:02:04","version":"1.31_01"},{"date":"2007-07-14T20:12:31","version":"1.31_02"},{"version":"1.32","date":"2007-09-03T21:16:05"},{"date":"2008-02-14T13:43:47","version":"1.33_01"},{"version":"1.34","date":"2008-07-24T01:16:26"},{"version":"1.35","date":"2008-07-24T22:14:14"},{"date":"2010-01-30T21:16:14","version":"1.36"},{"version":"1.37","date":"2011-09-15T22:28:53"},{"date":"2011-09-16T11:48:42","version":"1.38"},{"date":"2011-09-21T06:57:15","version":"1.39"},{"version":"1.40","date":"2011-09-23T02:41:56"},{"version":"1.41","date":"2011-09-24T22:11:30"},{"date":"2011-10-03T06:27:18","version":"1.42"},{"date":"2012-02-23T22:42:58","version":"1.42"},{"version":"1.42","date":"2012-02-24T21:44:59"},{"version":"1.42","date":"2012-02-24T22:54:26"},{"date":"2012-04-02T21:16:31","version":"1.46"},{"version":"1.47","date":"2012-04-04T00:54:15"},{"version":"1.48","date":"2012-04-25T07:03:14"},{"date":"2012-09-24T22:12:48","version":"1.49"},{"date":"2012-12-12T21:00:17","version":"1.49"},{"date":"2012-12-14T05:38:34","version":"1.49"},{"date":"2013-01-08T23:13:16","version":"1.51"},{"date":"2013-03-22T07:31:43","version":"1.51"},{"date":"2013-03-22T22:14:08","version":"1.53"},{"date":"2013-06-07T22:33:01","version":"1.53"},{"date":"2014-01-07T22:12:16","version":"1.56"},{"version":"1.56","date":"2014-01-11T21:39:27"},{"version":"1.58","date":"2014-01-14T23:29:28"},{"version":"1.59","date":"2014-05-09T22:10:47"},{"version":"1.60","date":"2014-05-10T21:41:25"},{"version":"1.61","date":"2014-05-12T10:07:16"},{"version":"1.61","date":"2014-05-18T21:22:05"},{"version":"1.63","date":"2014-05-19T10:44:07"},{"date":"2014-06-11T02:56:20","version":"1.64"},{"version":"1.65","date":"2014-07-14T10:26:12"},{"version":"1.66","date":"2014-08-21T01:09:39"},{"date":"2015-01-16T22:22:07","version":"1.67"},{"date":"2015-01-24T00:27:20","version":"1.68"},{"version":"1.68","date":"2015-06-03T21:47:53"},{"date":"2015-06-25T23:10:05","version":"1.70"},{"version":"1.71","date":"2015-09-18T03:19:23"},{"version":"1.72","date":"2015-09-21T21:54:16"},{"version":"1.73","date":"2016-04-11T00:17:37"},{"version":"1.74","date":"2016-04-11T21:48:54"},{"version":"1.75","date":"2016-07-31T01:22:50"},{"version":"1.76","date":"2016-07-31T02:53:16"},{"date":"2016-07-31T20:27:29","version":"1.77"},{"version":"1.78","date":"2016-08-13T08:42:51"},{"date":"2017-01-03T07:57:10","version":"1.79"},{"version":"1.80","date":"2017-01-04T21:41:24"},{"version":"1.81","date":"2017-03-27T21:02:27"},{"version":"1.82","date":"2017-10-31T04:50:54"},{"date":"2018-01-16T04:44:04","version":"1.83"},{"version":"1.84","date":"2018-01-17T03:12:01"},{"date":"2018-03-13T22:28:12","version":"1.85"},{"version":"1.86_01","date":"2018-07-04T20:41:16"},{"version":"1.86_02","date":"2018-07-06T12:18:38"},{"date":"2018-07-19T19:42:35","version":"1.86_03"},{"version":"1.86_04","date":"2018-07-30T17:01:10"},{"version":"1.86_05","date":"2018-08-23T08:31:09"},{"version":"1.86_06","date":"2018-09-29T15:52:57"},{"date":"2018-12-13T09:56:46","version":"1.86_07"},{"date":"2019-03-12T14:20:11","version":"1.86_08"},{"version":"1.86_09","date":"2019-03-12T21:00:55"},{"version":"1.86_10","date":"2019-05-05T01:38:23"},{"version":"1.86_11","date":"2019-05-08T16:24:16"},{"date":"2019-05-10T20:36:42","version":"1.88"},{"date":"2020-03-22T13:48:11","version":"1.89_01"},{"version":"1.89_02","date":"2020-08-06T23:48:51"},{"version":"1.89_03","date":"2020-12-12T16:47:00"},{"date":"2021-01-13T19:01:50","version":"1.89_04"},{"version":"1.89_05","date":"2021-01-21T00:51:03"},{"date":"2021-01-21T19:08:38","version":"1.90"},{"date":"2021-10-24T18:14:27","version":"1.91_01"},{"version":"1.91_02","date":"2021-12-29T22:30:53"},{"date":"2022-01-10T19:21:16","version":"1.91_03"},{"version":"1.92","date":"2022-01-12T22:47:57"},{"date":"2022-03-20T18:24:35","version":"1.93_01"},{"date":"2023-02-23T01:08:20","version":"1.93_02"},{"version":"1.93_03","date":"2024-01-02T14:34:40"},{"date":"2024-01-05T00:45:35","version":"1.93_04"},{"date":"2024-01-06T18:39:23","version":"1.93_05"},{"version":"1.94","date":"2024-01-08T01:22:27"}],"advisories":[{"severity":null,"affected_versions":["<1.25"],"references":["http://secunia.com/advisories/18639","http://www.securityfocus.com/bid/13471","http://www.mandriva.com/security/advisories?name=MDKSA-2006:023","https://usn.ubuntu.com/113-1/"],"id":"CPANSA-Net-SSLeay-2005-0106","distribution":"Net-SSLeay","description":"SSLeay.pm in libnet-ssleay-perl before 1.25 uses the /tmp/entropy file for entropy if a source is not set in the EGD_PATH variable, which allows local users to reduce the cryptographic strength of certain operations by modifying the file.\n","fixed_versions":[">=1.25"],"reported":"2005-05-03","cves":["CVE-2005-0106"]}]},"Spreadsheet-ParseXLSX":{"advisories":[{"affected_versions":["<0.28"],"references":["https://github.com/haile01/perl_spreadsheet_excel_rce_poc/blob/main/parse_xlsx_bomb.md","https://github.com/briandfoy/cpan-security-advisory/issues/131","https://nvd.nist.gov/vuln/detail/CVE-2024-22368","https://github.com/haile01/perl_spreadsheet_excel_rce_poc/blob/main/parse_xlsx_bomb.md","https://metacpan.org/dist/Spreadsheet-ParseXLSX/changes","https://github.com/advisories/GHSA-x2hg-844v-frvh"],"id":"CPANSA-Spreadsheet-ParseXLSX-2024-22368","reported":"2024-01-03","cves":["CVE-2024-22368"],"fixed_versions":[">=0.28"],"description":"The Spreadsheet::ParseXLSX package before 0.28 for Perl can encounter an out-of-memory condition during parsing of a crafted XLSX document. This occurs because the memoize implementation does not have appropriate constraints on merged cells.\n","distribution":"Spreadsheet-ParseXLSX"},{"affected_versions":["<0.30"],"references":["https://metacpan.org/release/NUDDLEGG/Spreadsheet-ParseXLSX-0.30/changes","https://gist.github.com/phvietan/d1c95a88ab6e17047b0248d6bf9eac4a","https://github.com/briandfoy/cpan-security-advisory/issues/134","https://github.com/MichaelDaum/spreadsheet-parsexlsx/issues/10","https://github.com/advisories/GHSA-cxjh-j6f8-vrmf","https://nvd.nist.gov/vuln/detail/CVE-2024-23525"],"reported":"2024-01-17","fixed_versions":[">=0.30"],"cves":["CVE-2024-23525"],"distribution":"Spreadsheet-ParseXLSX","description":"In default configuration of Spreadsheet::ParseXLSX, whenever we call Spreadsheet::ParseXLSX->new()->parse('user_input_file.xlsx'), we'd be vulnerable for XXE vulnerability if the XLSX file that we are parsing is from user input.\n","id":"CPANSA-Spreadsheet-ParseXLSX-2024-23525"}],"main_module":"Spreadsheet::ParseXLSX","versions":[{"date":"2013-07-17T02:45:07","version":"0.01"},{"date":"2013-07-17T15:14:43","version":"0.02"},{"version":"0.03","date":"2013-07-26T07:34:38"},{"date":"2013-07-31T18:28:38","version":"0.04"},{"version":"0.05","date":"2013-07-31T22:15:56"},{"date":"2013-08-29T20:02:30","version":"0.06"},{"version":"0.07","date":"2013-09-05T18:34:35"},{"version":"0.08","date":"2013-09-10T18:21:15"},{"version":"0.09","date":"2013-10-09T14:52:49"},{"version":"0.10","date":"2013-11-06T18:36:10"},{"date":"2013-11-14T00:30:46","version":"0.11"},{"version":"0.12","date":"2013-12-09T20:27:26"},{"version":"0.13","date":"2014-01-29T21:32:54"},{"version":"0.14","date":"2014-04-03T16:56:25"},{"version":"0.15","date":"2014-07-05T01:39:06"},{"version":"0.16","date":"2014-07-05T18:55:08"},{"version":"0.17","date":"2015-03-26T03:38:16"},{"version":"0.18","date":"2015-09-19T06:08:07"},{"version":"0.19","date":"2015-12-04T07:38:39"},{"date":"2015-12-05T18:45:32","version":"0.20"},{"version":"0.21","date":"2016-05-23T07:09:47"},{"version":"0.22","date":"2016-05-25T05:39:15"},{"date":"2016-05-29T03:01:59","version":"0.23"},{"version":"0.24","date":"2016-06-25T18:03:32"},{"version":"0.25","date":"2016-07-15T02:36:28"},{"version":"0.26","date":"2016-08-16T06:35:10"},{"version":"0.27","date":"2016-08-16T07:12:41"},{"date":"2024-01-02T13:45:35","version":"0.28"},{"version":"0.29","date":"2024-01-02T17:49:11"},{"date":"2024-01-17T11:34:43","version":"0.30"},{"date":"2024-01-18T11:30:17","version":"0.31"},{"version":"0.32","date":"2024-03-08T11:04:50"},{"date":"2024-03-08T12:50:37","version":"0.33"},{"date":"2024-03-13T10:28:28","version":"0.34"},{"version":"0.35","date":"2024-03-19T16:22:17"},{"version":"0.36","date":"2025-01-24T09:33:40"}]},"Alien-PCRE2":{"advisories":[{"id":"CPANSA-Alien-PCRE2-2019-20454","distribution":"Alien-PCRE2","description":"An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \\X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.\n","reported":"2020-02-14","fixed_versions":[">=0.016000"],"cves":["CVE-2019-20454"],"references":["https://bugs.php.net/bug.php?id=78338","https://bugs.exim.org/show_bug.cgi?id=2421","https://bugzilla.redhat.com/show_bug.cgi?id=1735494","https://vcs.pcre.org/pcre2?view=revision&revision=1092","https://security.gentoo.org/glsa/202006-16","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQRAHYHLRNMBTPR3KXVM27NSZP3KTOPI/"],"affected_versions":["<0.016000"],"comment":"This Alien module fetches libpcre2 sources from the network. It tries to get the latest unless you set environment variables to get a different version.\n","severity":"high"}],"versions":[{"date":"2017-06-30T23:18:21","version":"0.001000"},{"version":"0.002000","date":"2017-07-01T02:48:02"},{"version":"0.003000","date":"2017-07-02T04:51:35"},{"date":"2017-07-02T06:53:29","version":"0.004000"},{"date":"2017-07-02T09:21:41","version":"0.005000"},{"date":"2017-07-03T01:03:23","version":"0.006000"},{"version":"0.007000","date":"2017-07-12T17:40:07"},{"date":"2017-07-13T07:43:28","version":"0.008000"},{"version":"0.009000","date":"2017-07-15T10:31:20"},{"date":"2017-07-17T04:44:54","version":"0.010000"},{"date":"2017-07-18T18:30:06","version":"0.011000"},{"date":"2017-07-19T05:07:21","version":"0.012000"},{"date":"2017-07-23T04:43:01","version":"0.013000"},{"version":"0.014000","date":"2017-11-01T02:50:14"},{"date":"2017-11-08T00:42:33","version":"0.015000"},{"date":"2022-05-08T20:22:53","version":"0.016000"},{"version":"0.017000","date":"2023-02-04T00:21:59"}],"main_module":"Alien::PCRE2"},"Mojo-DOM-Role-Analyzer":{"main_module":"Mojo::DOM::Role::Analyzer","versions":[{"date":"2020-08-04T22:48:59","version":"0.007"},{"date":"2020-08-05T13:43:47","version":"0.008"},{"version":"0.009","date":"2020-08-06T02:47:29"},{"version":"0.010","date":"2020-08-08T13:39:18"},{"version":"0.011","date":"2020-08-09T13:43:20"},{"date":"2020-08-09T23:37:24","version":"0.012"},{"date":"2020-08-12T03:21:57","version":"0.013"},{"version":"0.014","date":"2020-08-13T21:09:19"},{"version":"0.015","date":"2020-08-16T15:39:17"}],"advisories":[{"severity":null,"embedded_vulnerability":{"distributed_version":null,"name":"polyfill.io"},"id":"CPANSA-Mojo-DOM-Role-Analyzer-2024-38526","distribution":"Mojo-DOM-Role-Analyzer","description":"pdoc provides API Documentation for Python Projects. Documentation generated with `pdoc --math` linked to JavaScript files from polyfill.io. The polyfill.io CDN has been sold and now serves malicious code. This issue has been fixed in pdoc 14.5.1.\n","reported":"2024-06-26","cves":["CVE-2024-38526"],"fixed_versions":[],"affected_versions":["<=0.015"],"references":["https://github.com/mitmproxy/pdoc/pull/703","https://github.com/mitmproxy/pdoc/security/advisories/GHSA-5vgj-ggm4-fg62","https://sansec.io/research/polyfill-supply-chain-attack","https://github.com/briandfoy/cpan-security-advisory/issues/155","https://github.com/sdondley/Mojo-DOM-Role-Analyzer/issues/10","https://stackdiary.com/polyfill-compromise-hits-100000-sites-in-a-supply-chain-attack/"]}]},"Net-Server-Coro":{"versions":[{"date":"2008-03-10T20:46:24","version":"0.2"},{"version":"0.3","date":"2008-10-22T17:26:30"},{"date":"2008-10-22T17:41:55","version":"0.4"},{"version":"0.5","date":"2009-10-16T03:46:28"},{"date":"2009-10-16T14:56:53","version":"0.6"},{"date":"2009-12-16T03:28:15","version":"0.7"},{"version":"0.8","date":"2010-01-30T16:11:57"},{"date":"2010-11-15T04:56:09","version":"0.9"},{"version":"1.0","date":"2011-09-05T05:33:01"},{"version":"1.1","date":"2011-09-05T05:37:09"},{"version":"1.2","date":"2011-10-29T06:29:11"},{"version":"1.3","date":"2012-11-12T08:14:39"}],"main_module":"Net::Server::Coro","advisories":[{"severity":null,"references":["https://www.itsecdb.com/oval/definition/oval/org.opensuse.security/def/20110411/CVE-2011-0411.html","https://metacpan.org/dist/Net-Server-Coro/changes"],"affected_versions":["<1.0"],"id":"CPANSA-Net-Server-Coro-2011-0411","reported":"2011-03-16","cves":["CVE-2011-0411"],"fixed_versions":[">=1.0"],"description":"Remaining contents of the read buffer could allow plaintext injection attacks wherein attackers could cause nominally SSL-only commands to be executed by appending them to the end of a STARTTLS.\n","distribution":"Net-Server-Coro"}]},"Image-ExifTool":{"main_module":"Image::ExifTool","versions":[{"date":"2004-10-04T15:37:06","version":"3.60"},{"date":"2004-11-02T12:46:54","version":"3.72"},{"version":"3.74","date":"2004-11-05T12:41:52"},{"version":"3.82","date":"2004-11-11T18:24:18"},{"version":"3.93","date":"2004-11-24T18:42:42"},{"date":"2004-11-25T16:34:47","version":"3.94"},{"version":"4.36","date":"2005-01-24T13:15:55"},{"version":"4.53","date":"2005-02-07T15:56:43"},{"version":"4.64","date":"2005-02-18T00:42:59"},{"version":"4.73","date":"2005-03-01T19:23:29"},{"version":"4.87","date":"2005-03-15T12:09:56"},{"version":"4.93","date":"2005-04-02T19:46:41"},{"date":"2005-04-20T12:41:30","version":"5.05"},{"version":"5.18","date":"2005-05-16T15:54:07"},{"version":"5.25","date":"2005-06-03T19:21:17"},{"version":"5.32","date":"2005-06-15T17:21:33"},{"date":"2005-07-19T18:16:02","version":"5.46"},{"date":"2005-08-24T14:58:18","version":"5.55"},{"version":"5.67","date":"2005-10-13T13:15:01"},{"date":"2005-11-18T13:04:29","version":"5.77"},{"version":"5.87","date":"2005-12-22T16:42:56"},{"date":"2006-02-19T20:26:14","version":"6.00"},{"date":"2006-05-12T12:10:32","version":"6.17"},{"version":"6.29","date":"2006-07-24T13:18:05"},{"date":"2006-09-06T20:26:16","version":"6.36"},{"version":"6.42","date":"2006-09-21T15:39:52"},{"date":"2006-11-20T13:52:55","version":"6.57"},{"date":"2006-12-20T13:07:23","version":"6.66"},{"version":"6.75","date":"2007-02-14T13:28:50"},{"date":"2007-02-16T13:21:27","version":"6.76"},{"version":"6.90","date":"2007-05-10T18:53:15"},{"date":"2007-10-24T11:39:52","version":"7.00"},{"version":"7.15","date":"2008-02-05T17:21:39"},{"date":"2008-03-12T12:24:57","version":"7.21"},{"version":"7.25","date":"2008-04-18T13:09:00"},{"date":"2008-05-31T11:39:35","version":"7.30"},{"version":"7.50","date":"2008-10-26T19:00:34"},{"version":"7.51","date":"2008-10-27T13:48:39"},{"date":"2009-01-06T13:48:18","version":"7.60"},{"date":"2009-02-09T14:25:12","version":"7.67"},{"version":"7.82","date":"2009-07-02T15:42:38"},{"version":"7.88","date":"2009-08-18T01:30:53"},{"version":"7.89","date":"2009-08-18T12:03:19"},{"date":"2009-11-20T19:06:24","version":"8.00"},{"version":"8.10","date":"2010-02-08T20:49:00"},{"version":"8.15","date":"2010-03-18T14:09:58"},{"version":"8.25","date":"2010-07-13T12:35:33"},{"date":"2010-11-21T21:29:00","version":"8.40"},{"version":"8.50","date":"2011-03-01T12:43:02"},{"date":"2011-06-27T11:52:50","version":"8.60"},{"version":"8.65","date":"2011-09-24T10:53:29"},{"version":"8.75","date":"2012-01-08T13:48:19"},{"date":"2012-01-27T14:19:10","version":"8.77"},{"date":"2012-03-25T12:07:06","version":"8.85"},{"date":"2012-04-28T12:06:48","version":"8.90"},{"version":"9.01","date":"2012-08-25T12:28:04"},{"version":"9.04","date":"2012-11-03T16:37:48"},{"version":"9.11","date":"2013-01-02T21:07:34"},{"date":"2013-01-03T01:49:33","version":"9.12"},{"version":"9.13","date":"2013-01-10T15:05:11"},{"date":"2013-04-06T11:38:39","version":"9.25"},{"version":"9.27","date":"2013-04-15T11:20:13"},{"version":"9.46","date":"2014-01-11T22:58:56"},{"date":"2014-02-22T14:40:30","version":"9.53"},{"date":"2014-05-11T13:34:36","version":"9.60"},{"version":"9.70","date":"2014-09-03T12:19:55"},{"version":"9.76","date":"2014-11-15T15:14:24"},{"date":"2015-03-14T11:33:58","version":"9.90"},{"date":"2015-08-18T13:30:08","version":"10.00"},{"version":"10.10","date":"2016-01-22T15:51:06"},{"date":"2016-04-20T13:25:01","version":"10.15"},{"date":"2016-06-13T14:05:58","version":"10.20"},{"version":"10.36","date":"2016-11-24T16:55:55"},{"version":"10.39","date":"2017-01-13T16:02:53"},{"date":"2017-01-14T17:30:45","version":"10.40"},{"date":"2017-04-20T12:54:29","version":"10.50"},{"date":"2017-06-05T14:41:23","version":"10.55"},{"date":"2018-02-22T13:27:40","version":"10.80"},{"version":"11.00","date":"2018-06-07T11:44:16"},{"date":"2018-06-11T12:18:41","version":"11.01"},{"date":"2018-09-28T01:34:43","version":"11.11"},{"date":"2019-03-06T15:14:28","version":"11.30"},{"date":"2019-06-11T15:29:41","version":"11.50"},{"version":"11.70","date":"2019-10-10T13:04:36"},{"date":"2020-01-28T15:40:58","version":"11.85"},{"version":"12.00","date":"2020-06-11T20:36:48"},{"version":"12.15","date":"2021-01-18T14:03:50"},{"version":"12.16","date":"2021-01-21T17:51:28"},{"date":"2021-05-21T00:37:46","version":"12.26"},{"version":"12.30","date":"2021-08-12T13:13:43"},{"version":"12.42","date":"2022-06-07T11:39:06"},{"date":"2022-06-07T20:05:13","version":"12.42"},{"version":"12.50","date":"2022-11-09T11:41:50"},{"version":"12.60","date":"2023-04-05T15:01:59"},{"date":"2023-11-19T16:15:22","version":"12.70"},{"date":"2024-01-31T01:08:08","version":"12.75"},{"version":"12.76","date":"2024-01-31T15:31:14"},{"version":"13.00","date":"2024-10-29T17:10:24"},{"version":"13.10","date":"2024-12-20T16:49:20"},{"date":"2025-03-11T12:01:50","version":"13.25"}],"advisories":[{"description":"lib/Image/ExifTool.pm in ExifTool before 12.38 mishandles a $file =~ /\\|$/ check, leading to command injection.\n","distribution":"Image-ExifTool","reported":"2022-01-25","fixed_versions":[">12.38"],"cves":["CVE-2022-23935"],"id":"CPANSA-Image-ExifTool-2022-23935","affected_versions":["<=12.37"],"references":["https://github.com/exiftool/exiftool/commit/74dbab1d2766d6422bb05b033ac6634bf8d1f582","https://gist.github.com/ert-plus/1414276e4cb5d56dd431c2f0429e4429"],"severity":"critical"},{"id":"CPANSA-Image-ExifTool-2021-22204","fixed_versions":[">12.23"],"reported":"2021-04-23","cves":["CVE-2021-22204"],"description":"Improper neutralization of user data in the DjVu file format in ExifTool versions 7.44 and up allows arbitrary code execution when parsing the malicious image\n","distribution":"Image-ExifTool","severity":null,"affected_versions":[">=7.44,<=12.23"],"references":["http://packetstormsecurity.com/files/162558/ExifTool-DjVu-ANT-Perl-Injection.html","http://packetstormsecurity.com/files/164768/GitLab-Unauthenticated-Remote-ExifTool-Command-Injection.html","http://packetstormsecurity.com/files/164994/GitLab-13.10.2-Remote-Code-Execution.html","http://packetstormsecurity.com/files/167038/ExifTool-12.23-Arbitrary-Code-Execution.html","http://www.openwall.com/lists/oss-security/2021/05/09/1","http://www.openwall.com/lists/oss-security/2021/05/10/5","https://github.com/exiftool/exiftool/commit/cf0f4e7dcd024ca99615bfd1102a841a25dde031#diff-fa0d652d10dbcd246e6b1df16c1e992931d3bb717a7e36157596b76bdadb3800","https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22204.json","https://hackerone.com/reports/1154542","https://lists.debian.org/debian-lts-announce/2021/05/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDKDLJLBTBBR66OOPXSXCG2PQRM5KCZL/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F6UOBPU3LSHAPRRJNISNVXZ5DSUIALLV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U4RF6PJCJ6NQOVJJJF6HN6BORUQVIXY6/","https://www.debian.org/security/2021/dsa-4910"]},{"description":"ExifTool 8.32 allows local users to gain privileges by creating a %TEMP%\\\\par-%username%\\\\cache-exiftool-8.32 folder with a victim's username, and then copying a Trojan horse ws32_32.dll file into this new folder, aka DLL Hijacking. NOTE: 8.32 is an obsolete version from 2010 (9.x was released starting in 2012, and 10.x was released starting in 2015).\n","distribution":"Image-ExifTool","reported":"2019-01-02","fixed_versions":[">8"],"cves":["CVE-2018-20211"],"id":"CPANSA-Image-ExifTool-2018-20211","affected_versions":["=8.32"],"references":["http://packetstormsecurity.com/files/150892/Exiftool-8.3.2.0-DLL-Hijacking.html","http://seclists.org/fulldisclosure/2018/Dec/44"],"severity":null}]},"Mojolicious-Plugin-OAuth2":{"advisories":[{"references":["https://metacpan.org/changes/distribution/Mojolicious-Plugin-OAuth2","https://github.com/marcusramberg/Mojolicious-Plugin-OAuth2/commit/68315d329059b427e13d486c0e10733f728709aa"],"affected_versions":["<1.3"],"id":"CPANSA-Mojolicious-Plugin-OAuth2-2014-01","description":"Param injection in case of several parameters of the same name are present.\n","distribution":"Mojolicious-Plugin-OAuth2","cves":[],"reported":"2014-10-07","fixed_versions":[">=1.3"]}],"versions":[{"version":"0.01","date":"2011-01-08T11:03:42"},{"version":"0.02","date":"2011-01-09T18:00:14"},{"version":"0.1","date":"2011-04-03T16:00:38"},{"version":"0.2","date":"2011-08-01T16:56:18"},{"version":"0.3","date":"2011-09-04T19:42:29"},{"date":"2011-09-07T16:59:50","version":"0.4"},{"date":"2011-10-19T11:55:32","version":"0.5"},{"date":"2012-03-09T21:15:39","version":"0.6"},{"version":"0.7","date":"2012-05-30T11:49:29"},{"date":"2012-08-23T20:18:41","version":"0.8"},{"version":"0.9","date":"2013-05-20T05:55:18"},{"version":"1.0","date":"2013-11-06T13:24:52"},{"version":"1.1","date":"2014-03-13T08:18:10"},{"version":"1.2","date":"2014-09-06T13:49:59"},{"version":"1.3","date":"2014-10-07T05:49:16"},{"version":"1.4","date":"2015-03-01T20:09:19"},{"version":"1.5","date":"2015-03-02T07:32:59"},{"date":"2015-03-18T16:40:18","version":"1.51"},{"date":"2015-04-06T20:46:39","version":"1.52"},{"date":"2015-09-08T07:27:41","version":"1.53"},{"version":"1.54","date":"2018-08-30T10:48:55"},{"date":"2018-09-08T18:30:54","version":"1.55"},{"date":"2018-09-23T22:04:16","version":"1.56"},{"date":"2018-09-24T08:55:14","version":"1.57"},{"date":"2019-07-03T12:24:11","version":"1.58"},{"date":"2021-02-16T23:34:41","version":"1.59"},{"date":"2021-10-27T10:37:42","version":"2.00"},{"version":"2.01","date":"2021-10-28T09:30:06"},{"version":"2.02","date":"2022-02-08T09:50:33"}],"main_module":"Mojolicious::Plugin::OAuth2"},"CGI":{"main_module":"CGI","versions":[{"version":"2.10","date":"1995-11-25T09:21:00"},{"date":"1995-12-28T09:08:00","version":"2.13"},{"date":"1996-05-22T22:30:00","version":"2.20"},{"version":"2.21","date":"1996-05-31T05:31:00"},{"version":"2.22","date":"1996-08-07T09:24:00"},{"version":"2.23","date":"1996-08-14T08:17:00"},{"version":"2.24","date":"1996-08-21T09:09:00"},{"date":"1996-09-10T14:23:00","version":"2.25"},{"version":"2.26","date":"1996-10-22T11:17:00"},{"date":"1996-10-24T18:21:00","version":"2.27"},{"date":"1996-12-02T11:48:00","version":"2.28"},{"date":"1996-12-09T13:39:00","version":"2.29"},{"version":"2.30","date":"1997-01-02T16:40:00"},{"version":"2.31","date":"1997-02-15T15:36:00"},{"version":"2.32","date":"1997-03-25T08:58:00"},{"date":"1997-04-04T20:45:00","version":"2.33"},{"date":"1997-04-10T15:41:00","version":"2.34"},{"date":"1997-04-20T18:29:00","version":"2.35"},{"version":"2.36","date":"1997-05-09T09:33:00"},{"date":"1997-08-29T04:42:00","version":"2.37"},{"date":"1997-09-15T17:51:00","version":"2.37"},{"version":"2.37","date":"1997-10-01T04:15:00"},{"version":"2.37","date":"1997-10-12T07:10:00"},{"version":"2.37","date":"1997-11-23T11:37:00"},{"date":"1997-12-20T09:57:00","version":"2.37"},{"date":"1998-01-16T12:22:00","version":"2.37"},{"version":"2.37","date":"1998-01-19T11:34:00"},{"version":"2.37","date":"1998-01-26T11:00:00"},{"date":"1998-01-29T19:48:00","version":"2.37"},{"version":"2.37","date":"1998-02-02T13:37:00"},{"version":"2.37","date":"1998-02-05T08:25:00"},{"date":"1998-02-09T13:58:00","version":"2.37"},{"version":"2.37","date":"1998-02-16T16:21:00"},{"version":"2.37","date":"1998-02-23T08:33:00"},{"date":"1998-02-24T16:52:00","version":"2.37"},{"date":"1998-03-13T15:33:00","version":"2.37"},{"version":"2.38","date":"1998-03-22T21:12:00"},{"version":"2.39","date":"1998-03-24T22:37:08"},{"version":"2.40","date":"1998-05-20T09:17:00"},{"version":"2.41","date":"1998-05-28T15:03:00"},{"version":"2.42","date":"1998-06-09T09:00:00"},{"date":"1998-10-14T19:06:31","version":"2.43"},{"date":"1998-11-24T19:41:41","version":"2.44"},{"version":"2.45","date":"1998-11-26T11:07:27"},{"version":"2.46","date":"1998-12-06T10:22:46"},{"version":"2.47","date":"1999-02-18T03:50:16"},{"date":"1999-02-19T14:10:25","version":"2.48"},{"version":"2.49","date":"1999-02-23T22:00:33"},{"version":"2.52","date":"1999-06-08T15:13:15"},{"version":"2.53","date":"1999-06-09T14:56:06"},{"date":"1999-08-09T14:18:33","version":"2.54"},{"version":"2.55","date":"1999-08-31T17:11:00"},{"version":"2.56","date":"1999-09-13T21:11:51"},{"date":"2000-03-23T23:00:12","version":"2.58"},{"date":"2000-03-24T12:31:52","version":"2.59"},{"date":"2000-03-27T22:11:34","version":"2.60"},{"date":"2000-03-28T02:50:18","version":"2.61"},{"date":"2000-03-28T21:38:03","version":"2.62"},{"date":"2000-04-10T15:19:54","version":"2.63"},{"date":"2000-04-11T15:25:13","version":"2.64"},{"version":"2.65","date":"2000-04-11T15:55:40"},{"date":"2000-04-12T20:16:46","version":"2.66"},{"date":"2000-05-16T01:38:08","version":"2.67"},{"date":"2000-05-18T17:55:55","version":"2.68"},{"date":"2000-07-28T03:06:11","version":"2.69"},{"version":"2.70","date":"2000-08-04T19:37:27"},{"date":"2000-08-13T16:09:25","version":"2.71"},{"version":"2.72","date":"2000-08-20T17:35:50"},{"version":"3.","date":"2000-08-24T13:33:37"},{"version":"2.73","date":"2000-09-13T02:55:51"},{"date":"2000-09-13T16:35:14","version":"2.74"},{"version":"2.75","date":"2001-02-02T15:43:07"},{"version":"2.751","date":"2001-02-02T15:50:53"},{"date":"2001-02-04T23:49:27","version":"2.752"},{"version":"2.753","date":"2001-03-12T17:00:13"},{"date":"2001-06-15T15:33:28","version":"3.02"},{"version":"3.02_","date":"2001-06-29T14:47:39"},{"date":"2001-07-05T16:13:55","version":"3.03_01"},{"date":"2001-07-26T21:29:22","version":"2.76"},{"version":"2.77","date":"2001-08-07T12:33:22"},{"date":"2001-09-26T02:26:36","version":"2.78"},{"date":"2001-12-09T21:39:11","version":"2.79"},{"date":"2002-01-12T02:47:17","version":"2.80"},{"date":"2002-04-10T19:39:49","version":"2.81"},{"version":"2.84","date":"2002-09-11T12:27:48"},{"version":"2.85","date":"2002-09-11T14:01:02"},{"version":"2.86","date":"2002-09-12T03:58:40"},{"version":"2.87","date":"2002-10-07T02:00:58"},{"version":"2.88","date":"2002-10-14T13:58:09"},{"version":"2.89","date":"2002-10-16T17:50:26"},{"date":"2002-11-22T23:03:39","version":"0"},{"version":"2.90","date":"2003-02-10T20:11:57"},{"date":"2003-02-11T14:15:15","version":"2.91"},{"date":"2003-04-28T00:44:10","version":"2.92"},{"date":"2003-04-28T13:37:43","version":"2.93"},{"version":"2.94","date":"2003-06-09T12:15:29"},{"version":"2.95","date":"2003-06-13T02:35:42"},{"version":"2.96","date":"2003-06-16T18:42:38"},{"version":"2.97","date":"2003-06-17T23:32:52"},{"date":"2003-07-16T17:06:29","version":"2.98"},{"version":"2.99","date":"2003-08-01T14:43:54"},{"date":"2003-08-18T17:51:48","version":"3.00"},{"date":"2003-12-10T17:05:47","version":"3.01"},{"date":"2004-01-13T16:34:47","version":"3.03"},{"version":"3.04","date":"2004-01-19T12:44:30"},{"date":"2004-04-12T20:39:57","version":"3.05"},{"date":"2005-03-09T21:06:46","version":"3.06"},{"date":"2005-03-14T16:34:03","version":"3.07"},{"date":"2005-04-20T15:31:11","version":"3.08"},{"date":"2005-05-05T20:16:55","version":"3.09"},{"version":"3.10","date":"2005-05-13T21:48:46"},{"version":"3.11","date":"2005-08-03T21:17:14"},{"version":"3.12","date":"2005-12-04T16:46:53"},{"date":"2005-12-05T13:54:26","version":"3.13"},{"date":"2005-12-06T22:14:19","version":"3.14"},{"date":"2005-12-07T20:16:49","version":"3.15"},{"version":"3.16","date":"2006-02-08T18:50:56"},{"date":"2006-02-24T19:04:58","version":"3.17"},{"date":"2006-04-17T13:56:06","version":"3.19"},{"version":"3.20","date":"2006-04-23T14:27:55"},{"date":"2006-08-21T19:12:36","version":"3.21"},{"version":"3.22","date":"2006-08-23T15:24:41"},{"date":"2006-08-24T11:53:26","version":"3.23"},{"date":"2006-09-28T17:09:45","version":"3.25"},{"date":"2007-02-27T15:42:54","version":"3.27"},{"date":"2007-03-29T15:38:01","version":"3.28"},{"version":"3.29","date":"2007-04-16T17:00:18"},{"date":"2007-11-30T19:06:19","version":"3.31"},{"version":"3.32","date":"2007-12-27T18:41:32"},{"date":"2008-01-03T15:03:17","version":"3.33"},{"date":"2008-03-18T16:04:41","version":"3.34"},{"date":"2008-03-27T14:26:48","version":"3.35"},{"version":"3.37","date":"2008-04-23T13:09:44"},{"version":"3.38","date":"2008-06-25T14:58:32"},{"date":"2008-07-29T15:01:52","version":"3.39"},{"version":"3.40","date":"2008-08-06T18:21:51"},{"version":"3.41","date":"2008-08-26T13:56:27"},{"date":"2008-09-08T14:15:41","version":"3.42"},{"version":"3.43","date":"2009-04-06T18:35:19"},{"version":"3.44","date":"2009-07-30T16:34:17"},{"version":"3.45","date":"2009-08-14T13:37:12"},{"date":"2009-09-09T15:39:42","version":"3.46"},{"date":"2009-09-09T20:03:01","version":"3.47"},{"date":"2009-09-25T15:07:03","version":"3.48"},{"date":"2010-02-05T16:24:53","version":"3.49"},{"version":"3.50","date":"2010-11-08T21:53:26"},{"date":"2011-01-05T18:28:41","version":"3.51"},{"date":"2011-01-25T04:30:05","version":"3.52"},{"date":"2011-04-25T23:01:21","version":"3.53"},{"version":"3.54","date":"2011-04-28T14:36:41"},{"date":"2011-06-03T15:39:16","version":"3.55"},{"version":"3.56","date":"2011-11-09T02:00:20"},{"date":"2011-11-09T15:59:18","version":"3.57"},{"version":"3.58","date":"2011-11-12T03:36:07"},{"date":"2011-12-30T13:35:35","version":"3.59"},{"version":"3.60","date":"2012-08-16T03:21:13"},{"version":"3.61","date":"2012-11-03T02:10:42"},{"version":"3.62","date":"2012-11-10T01:40:50"},{"date":"2012-11-14T23:45:29","version":"3.63"},{"version":"3.64","date":"2013-11-24T01:22:00"},{"date":"2014-02-12T03:13:58","version":"3.65"},{"version":"3.65_01","date":"2014-05-15T12:59:58"},{"version":"3.65_02","date":"2014-05-16T11:43:33"},{"date":"2014-05-20T12:31:46","version":"3.65_03"},{"version":"4.00","date":"2014-05-22T19:58:14"},{"version":"4.01","date":"2014-05-27T13:13:51"},{"version":"4.02","date":"2014-06-09T13:55:49"},{"date":"2014-07-02T14:53:06","version":"4.03"},{"version":"4.03_01","date":"2014-07-28T18:30:34"},{"version":"4.03_02","date":"2014-07-30T14:26:40"},{"date":"2014-08-13T11:40:14","version":"4.03_03"},{"date":"2014-09-04T14:42:14","version":"4.04"},{"version":"4.04_01","date":"2014-09-20T16:08:55"},{"version":"4.04_02","date":"2014-09-28T19:57:05"},{"version":"4.04_03","date":"2014-09-29T09:50:07"},{"date":"2014-10-06T12:01:14","version":"4.04_04"},{"version":"4.04_05","date":"2014-10-06T12:24:10"},{"version":"4.05","date":"2014-10-08T07:42:49"},{"version":"4.06","date":"2014-10-10T11:35:49"},{"version":"4.07","date":"2014-10-12T16:29:35"},{"version":"4.08","date":"2014-10-18T11:00:38"},{"date":"2014-10-21T07:33:36","version":"4.09"},{"date":"2014-11-25T21:06:50","version":"4.09_01"},{"version":"4.10","date":"2014-11-27T12:53:51"},{"version":"4.10_01","date":"2014-11-30T12:12:26"},{"version":"4.11","date":"2014-12-03T07:25:15"},{"version":"4.12","date":"2014-12-18T08:35:52"},{"date":"2014-12-18T09:21:52","version":"4.13"},{"date":"2015-02-12T14:19:13","version":"4.13_01"},{"version":"4.13_02","date":"2015-02-13T08:01:29"},{"date":"2015-03-01T13:28:25","version":"4.13_03"},{"version":"4.13_04","date":"2015-03-08T16:09:21"},{"date":"2015-03-25T17:55:15","version":"4.13_05"},{"date":"2015-04-01T06:51:57","version":"4.14"},{"version":"4.14_01","date":"2015-04-17T14:27:39"},{"version":"4.15","date":"2015-04-20T07:15:45"},{"date":"2015-05-29T14:48:42","version":"4.20"},{"version":"4.21","date":"2015-06-22T07:50:02"},{"version":"4.22","date":"2015-10-16T09:46:31"},{"date":"2015-12-20T18:33:35","version":"4.24"},{"date":"2015-12-21T09:29:19","version":"4.25"},{"date":"2016-02-04T16:37:12","version":"4.26"},{"version":"4.27","date":"2016-03-02T08:03:46"},{"date":"2016-03-14T07:21:48","version":"4.28"},{"date":"2016-05-22T12:23:19","version":"4.28_01"},{"date":"2016-05-22T12:54:23","version":"4.28_02"},{"version":"4.28_03","date":"2016-05-23T08:25:25"},{"date":"2016-06-09T12:01:20","version":"4.29"},{"date":"2016-06-09T12:11:54","version":"4.30"},{"date":"2016-06-14T07:14:00","version":"4.31"},{"version":"4.32","date":"2016-07-19T07:05:46"},{"version":"4.33","date":"2016-09-16T09:47:49"},{"date":"2016-10-13T11:58:55","version":"4.34"},{"date":"2016-10-13T13:56:21","version":"4.35"},{"version":"4.35_01","date":"2017-03-29T08:56:26"},{"date":"2017-04-06T14:42:12","version":"4.36"},{"date":"2017-11-01T10:17:40","version":"4.37"},{"date":"2017-12-01T08:41:02","version":"4.38"},{"date":"2018-08-13T15:57:52","version":"4.39"},{"version":"4.40","date":"2018-08-15T08:39:39"},{"version":"4.41","date":"2019-03-26T15:58:49"},{"version":"4.42","date":"2019-03-26T16:33:27"},{"date":"2019-05-01T14:28:45","version":"4.43"},{"date":"2019-06-03T09:00:55","version":"4.44"},{"date":"2020-01-13T07:03:55","version":"4.45"},{"version":"4.46","date":"2020-02-03T14:49:22"},{"date":"2020-05-01T13:01:44","version":"4.47"},{"date":"2020-06-02T08:22:41","version":"4.48"},{"date":"2020-06-08T09:46:25","version":"4.49"},{"version":"4.50","date":"2020-06-22T07:35:25"},{"version":"4.51","date":"2020-10-05T06:14:39"},{"version":"4.52","date":"2021-05-04T08:02:27"},{"date":"2021-06-03T06:45:55","version":"4.53"},{"date":"2022-02-03T07:52:34","version":"4.54"},{"date":"2023-01-03T07:45:53","version":"4.55"},{"version":"4.56","date":"2023-03-03T08:51:51"},{"date":"2023-05-02T13:16:01","version":"4.57"},{"date":"2023-10-02T07:08:45","version":"4.58"},{"version":"4.59","date":"2023-10-02T07:14:30"},{"date":"2023-11-01T07:57:12","version":"4.60"},{"date":"2024-01-08T15:17:04","version":"4.61"},{"version":"4.62","date":"2024-03-01T13:46:49"},{"date":"2024-03-06T15:20:30","version":"4.63"},{"date":"2024-03-18T12:10:48","version":"4.64"},{"version":"4.65","date":"2024-06-04T15:15:17"},{"version":"4.66","date":"2024-06-19T08:59:52"},{"version":"4.67","date":"2025-01-08T15:27:45"},{"date":"2025-04-01T09:38:18","version":"4.68"},{"date":"2006-01-28T00:00:00","perl_release":"5.009003","dual_lived":1,"version":"3.15_01"}],"advisories":[{"affected_versions":["<3.63"],"references":["http://www.securityfocus.com/bid/56562","http://www.openwall.com/lists/oss-security/2012/11/15/6","https://github.com/markstos/CGI.pm/pull/23","http://www.securitytracker.com/id?1027780","http://cpansearch.perl.org/src/MARKSTOS/CGI.pm-3.63/Changes","http://secunia.com/advisories/51457","http://www.ubuntu.com/usn/USN-1643-1","http://www.debian.org/security/2012/dsa-2586","http://rhn.redhat.com/errata/RHSA-2013-0685.html","http://secunia.com/advisories/55314","http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","https://exchange.xforce.ibmcloud.com/vulnerabilities/80098"],"severity":null,"distribution":"CGI","description":"CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm.\n","cves":["CVE-2012-5526"],"reported":"2012-11-21","fixed_versions":[">=3.63"],"id":"CPANSA-CGI-2012-5526"},{"id":"CPANSA-CGI-2011-2766","description":"Usage of deprecated FCGI.pm API.\n","distribution":"CGI","cves":["CVE-2011-2766"],"reported":"2011-11-08","fixed_versions":[">=3.56"],"references":["https://rt.cpan.org/Public/Bug/Display.html?id=68380","http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-2766"],"affected_versions":["<3.56"]},{"id":"CPANSA-CGI-2010-02","reported":"2010-11-08","cves":[],"fixed_versions":[">=3.50"],"distribution":"CGI","description":"Non-random MIME boundary.\n","affected_versions":["<3.50"]},{"id":"CPANSA-CGI-2010-01","cves":[],"reported":"2010-02-05","fixed_versions":[">=3.49"],"description":"Newlines in headers.\n","distribution":"CGI","affected_versions":["<3.49"]},{"distribution":"CGI","description":"Unspecified vulnerability in CGI.pm 3.50 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unknown vectors. NOTE: this issue exists because of an incomplete fix for CVE-2010-2761.\n","cves":["CVE-2010-4411"],"reported":"2010-12-06","fixed_versions":[">=3.50"],"id":"CPANSA-CGI-2010-4411","references":["http://openwall.com/lists/oss-security/2010/12/01/3","http://www.mandriva.com/security/advisories?name=MDVSA-2011:008","http://www.vupen.com/english/advisories/2011/0106","http://www.bugzilla.org/security/3.2.9/","http://secunia.com/advisories/43033","https://bugzilla.mozilla.org/show_bug.cgi?id=591165","http://www.vupen.com/english/advisories/2011/0207","http://www.vupen.com/english/advisories/2011/0271","http://www.vupen.com/english/advisories/2011/0212","http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html","http://secunia.com/advisories/43068","http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html","http://secunia.com/advisories/43165","http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html","http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"],"affected_versions":["<3.50"],"severity":null},{"severity":null,"references":["https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380","http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes","http://openwall.com/lists/oss-security/2010/12/01/1","http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html","http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm","http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1","http://openwall.com/lists/oss-security/2010/12/01/2","http://openwall.com/lists/oss-security/2010/12/01/3","https://bugzilla.mozilla.org/show_bug.cgi?id=600464","http://osvdb.org/69588","http://osvdb.org/69589","http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html","http://www.mandriva.com/security/advisories?name=MDVSA-2010:237","http://www.vupen.com/english/advisories/2011/0076","http://www.mandriva.com/security/advisories?name=MDVSA-2010:250","http://secunia.com/advisories/42877","https://bugzilla.mozilla.org/show_bug.cgi?id=591165","http://www.vupen.com/english/advisories/2011/0207","http://www.bugzilla.org/security/3.2.9/","http://secunia.com/advisories/43033","http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053591.html","http://secunia.com/advisories/43147","http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053576.html","http://www.vupen.com/english/advisories/2011/0249","http://www.vupen.com/english/advisories/2011/0271","http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html","http://www.vupen.com/english/advisories/2011/0212","http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html","http://secunia.com/advisories/43165","http://secunia.com/advisories/43068","http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html","http://www.redhat.com/support/errata/RHSA-2011-1797.html","http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"],"affected_versions":["<3.50"],"id":"CPANSA-CGI-2010-2761","reported":"2010-12-06","fixed_versions":[">=3.50"],"cves":["CVE-2010-2761"],"description":"The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.\n","distribution":"CGI"}]},"Archive-Tar":{"main_module":"Archive::Tar","versions":[{"version":"0.071","date":"1998-02-02T06:13:59"},{"date":"1998-04-10T17:07:35","version":"0.072"},{"date":"1998-07-30T00:56:03","version":"0.08"},{"date":"1999-01-10T02:22:23","version":"0.20"},{"date":"1999-02-02T19:01:41","version":"0.21"},{"version":"0.22","date":"2000-04-28T00:37:46"},{"version":"0.23","date":"2003-01-21T23:07:30"},{"date":"2003-03-18T17:08:50","version":"0.99_01"},{"date":"2003-03-26T14:57:35","version":"0.99_02"},{"date":"2003-04-28T16:01:24","version":"0.99_03"},{"date":"2003-04-28T16:57:58","version":"0.99_04"},{"date":"2003-04-30T12:52:19","version":"0.99_05"},{"version":"0.99_06","date":"2003-05-05T12:06:35"},{"date":"2003-05-31T09:27:33","version":"1.00"},{"version":"1.01","date":"2003-06-08T10:46:56"},{"version":"1.02","date":"2003-06-12T09:47:58"},{"version":"1.03","date":"2003-06-26T12:52:19"},{"date":"2003-07-27T17:07:50","version":"1.04"},{"date":"2003-08-25T13:38:44","version":"1.05"},{"date":"2003-10-15T14:35:12","version":"1.06"},{"version":"1.07","date":"2003-10-17T11:42:14"},{"date":"2004-01-05T12:59:23","version":"1.08"},{"version":"1.09","date":"2004-05-22T12:32:02"},{"date":"2004-06-11T19:24:06","version":"1.10"},{"version":"1.20","date":"2004-11-09T16:12:40"},{"date":"2004-11-10T16:04:13","version":"1.21"},{"date":"2004-11-21T10:09:52","version":"1.22"},{"version":"1.23","date":"2004-12-03T15:53:06"},{"date":"2005-05-03T13:11:19","version":"1.24"},{"date":"2005-08-20T10:14:40","version":"1.25"},{"date":"2005-08-22T09:29:53","version":"1.26"},{"date":"2006-01-19T13:31:53","version":"1.28"},{"date":"2006-03-03T13:56:20","version":"1.29"},{"version":"1.30","date":"2006-08-02T15:00:41"},{"date":"2007-05-18T12:18:49","version":"1.31"},{"date":"2007-05-25T09:32:48","version":"1.32"},{"date":"2007-08-15T14:20:33","version":"1.34"},{"date":"2007-09-16T09:13:21","version":"1.36"},{"version":"1.37_01","date":"2007-11-11T11:59:00"},{"version":"1.38","date":"2007-12-24T11:02:07"},{"version":"1.39_01","date":"2008-08-22T16:33:49"},{"date":"2008-08-25T03:56:58","version":"1.39_02"},{"date":"2008-08-25T22:07:56","version":"1.39_03"},{"version":"1.39_04","date":"2008-09-08T12:14:37"},{"date":"2008-10-13T13:42:10","version":"1.40"},{"version":"1.42","date":"2008-12-13T17:10:15"},{"date":"2009-01-19T17:08:08","version":"1.44"},{"date":"2009-03-05T16:10:06","version":"1.46"},{"date":"2009-04-20T17:07:30","version":"1.48"},{"version":"1.50","date":"2009-06-12T12:01:54"},{"version":"1.52","date":"2009-06-13T11:29:50"},{"date":"2009-09-10T12:13:03","version":"1.54"},{"version":"1.56","date":"2010-02-03T14:40:15"},{"version":"1.58","date":"2010-02-17T21:47:16"},{"date":"2010-04-23T14:12:31","version":"1.60"},{"date":"2010-06-28T21:02:59","version":"1.62"},{"date":"2010-07-09T11:04:45","version":"1.64"},{"date":"2010-07-26T08:44:00","version":"1.66"},{"version":"1.68","date":"2010-08-17T16:06:19"},{"version":"1.70","date":"2010-11-15T22:02:53"},{"version":"1.72","date":"2010-11-18T19:22:01"},{"version":"1.74","date":"2010-12-18T21:19:51"},{"version":"1.76","date":"2011-01-07T22:27:40"},{"date":"2011-09-08T22:13:33","version":"1.78"},{"version":"1.80","date":"2011-10-13T10:25:39"},{"date":"2011-11-21T12:14:43","version":"1.82"},{"version":"1.84","date":"2012-03-03T00:00:05"},{"date":"2012-05-24T11:38:09","version":"1.86"},{"version":"1.88","date":"2012-06-01T11:06:25"},{"date":"2012-09-05T18:19:00","version":"1.90"},{"date":"2013-06-18T15:13:27","version":"1.92"},{"version":"0.93_01","date":"2013-10-22T14:28:22"},{"date":"2013-10-22T14:36:08","version":"1.93_02"},{"date":"2013-10-24T18:02:48","version":"1.94"},{"date":"2013-10-24T19:10:34","version":"1.96"},{"date":"2014-06-14T17:12:02","version":"1.98"},{"date":"2014-06-15T14:59:24","version":"2.00"},{"date":"2014-09-14T18:03:23","version":"2.02"},{"version":"2.04","date":"2014-12-14T20:13:33"},{"version":"2.06","date":"2016-04-24T14:05:11"},{"version":"2.08","date":"2016-05-12T08:57:35"},{"version":"2.10","date":"2016-07-27T12:40:29"},{"date":"2016-10-16T11:27:58","version":"2.12"},{"version":"2.14","date":"2016-10-20T12:38:57"},{"version":"2.16","date":"2016-11-01T19:19:36"},{"version":"2.18","date":"2016-11-07T13:36:15"},{"version":"2.20","date":"2016-12-15T10:54:40"},{"version":"2.22","date":"2016-12-16T09:46:28"},{"date":"2016-12-16T15:27:38","version":"2.24"},{"date":"2017-05-12T12:46:05","version":"2.26"},{"version":"2.28","date":"2018-06-08T10:57:04"},{"version":"2.30","date":"2018-06-19T11:55:28"},{"version":"2.32","date":"2018-09-13T07:17:10"},{"date":"2020-02-01T16:41:47","version":"2.34"},{"version":"2.36","date":"2020-02-02T13:34:34"},{"date":"2020-06-25T07:51:56","version":"2.38"},{"date":"2021-07-27T09:51:54","version":"2.40"},{"version":"3.00","date":"2023-03-25T12:10:20"},{"date":"2023-04-12T23:09:11","version":"3.02"},{"date":"2025-02-25T20:25:09","version":"3.04"},{"date":"2006-01-28T00:00:00","dual_lived":1,"version":"1.26_01","perl_release":"5.009003"},{"dual_lived":1,"version":"1.30_01","perl_release":"5.009004","date":"2006-08-15T00:00:00"},{"date":"2017-01-14T00:00:00","dual_lived":1,"version":"2.04_01","perl_release":"5.022003"},{"date":"2018-11-29T00:00:00","dual_lived":1,"version":"2.24_01","perl_release":"5.026003"},{"date":"2023-12-30T00:00:00","perl_release":"5.039006","version":"3.02_001","dual_lived":1}],"advisories":[{"references":["https://security-tracker.debian.org/tracker/CVE-2018-12015","https://github.com/jib/archive-tar-new/commit/ae65651eab053fc6dc4590dbb863a268215c1fc5"],"affected_versions":["<2.28"],"severity":"medium","cves":["CVE-2018-12015"],"reported":"2018-06-12","fixed_versions":[">=2.28"],"description":"In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.\n","distribution":"Archive-Tar","id":"CPANSA-Archive-Tar-2018-01"},{"affected_versions":["<=1.36"],"references":["http://rt.cpan.org/Public/Bug/Display.html?id=29517","https://bugzilla.redhat.com/show_bug.cgi?id=295021","http://rt.cpan.org/Public/Bug/Display.html?id=30380","https://issues.rpath.com/browse/RPL-1716","http://www.securityfocus.com/bid/26355","http://secunia.com/advisories/27539","http://osvdb.org/40410","http://www.ubuntu.com/usn/usn-700-1","http://secunia.com/advisories/33314","http://www.ubuntu.com/usn/usn-700-2","http://www.gentoo.org/security/en/glsa/glsa-200812-10.xml","http://secunia.com/advisories/33116","http://www.vupen.com/english/advisories/2007/3755","https://exchange.xforce.ibmcloud.com/vulnerabilities/38285","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11658"],"severity":null,"description":"Directory traversal vulnerability in the Archive::Tar Perl module 1.36 and earlier allows user-assisted remote attackers to overwrite arbitrary files via a TAR archive that contains a file whose name is an absolute path or has \"..\" sequences.\n","distribution":"Archive-Tar","fixed_versions":[">1.36"],"reported":"2007-11-02","cves":["CVE-2007-4829"],"id":"CPANSA-Archive-Tar-2007-4829"},{"affected_versions":["<2.10"],"references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"severity":"high","distribution":"Archive-Tar","description":"'(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.'\n","cves":["CVE-2016-1238"],"reported":"2016-08-02","fixed_versions":[">=2.10"],"id":"CPANSA-Archive-Tar-2016-1238"}]},"Batch-Batchrun":{"versions":[{"version":"1.03","date":"1999-08-21T20:25:47"}],"main_module":"Batch::Batchrun","advisories":[{"severity":"high","references":["http://www.openwall.com/lists/oss-security/2011/11/04/2","http://www.openwall.com/lists/oss-security/2011/11/04/4","https://rt.cpan.org/Public/Bug/Display.html?id=69594"],"affected_versions":[">=1.03"],"id":"CPANSA-Batch-Batchrun-2011-4117","description":"The Batch::Batchrun module 1.03 for Perl does not properly handle temporary files.\n","distribution":"Batch-Batchrun","reported":"2020-01-31","cves":["CVE-2011-4117"],"fixed_versions":[]}]},"perl":{"advisories":[{"affected_versions":["<1.13"],"references":["http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069752.html","http://www.securityfocus.com/bid/49858","http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod","http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77","http://secunia.com/advisories/46172","https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1","https://bugzilla.redhat.com/show_bug.cgi?id=742987"],"severity":null,"distribution":"perl","description":"The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.\n","cves":["CVE-2011-2728"],"reported":"2012-12-21","fixed_versions":[">=1.13"],"id":"CPANSA-File-Glob-2011-2728"},{"description":"(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","distribution":"perl","reported":"2016-08-02","cves":["CVE-2016-1238"],"fixed_versions":[">=5.24.1"],"id":"CPANSA-ExtUtils-ParseXS-2016-1238","affected_versions":["<5.24.1"],"references":["https://perldoc.perl.org/5.24.1/perldelta","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","http://www.debian.org/security/2016/dsa-3628","http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securityfocus.com/bid/92136","http://www.securitytracker.com/id/1036440","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c%40%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://rt.perl.org/Public/Bug/Display.html?id=127834","https://security.gentoo.org/glsa/201701-75","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","http://www.debian.org/security/2016/dsa-3628","http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securityfocus.com/bid/92136","http://www.securitytracker.com/id/1036440","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c%40%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://rt.perl.org/Public/Bug/Display.html?id=127834","https://security.gentoo.org/glsa/201701-75","https://security.gentoo.org/glsa/201812-07"],"severity":"high"},{"severity":"high","affected_versions":[">=5.22.0,<5.24.0"],"references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/","https://github.com/Perl/perl5/commit/08e3451d7b3b714ad63a27f1b9c2a23ee75d15ee","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/","http://www.openwall.com/lists/oss-security/2016/07/07/1","http://www.openwall.com/lists/oss-security/2016/07/08/5","https://rt.cpan.org/Public/Bug/Display.html?id=115808","http://www.debian.org/security/2016/dsa-3628","http://www.securitytracker.com/id/1036260","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/","http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html","http://www.securityfocus.com/bid/91685","https://security.gentoo.org/glsa/201701-75","https://usn.ubuntu.com/3625-2/","https://usn.ubuntu.com/3625-1/","https://github.com/Perl/perl5/blob/blead/pod/perl5260delta.pod"],"id":"CPANSA-perl-2016-6185","reported":"2016-08-02","fixed_versions":[">=5.24.0"],"cves":["CVE-2016-6185"],"distribution":"perl","description":"The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.\n"},{"references":["https://rt.perl.org/Public/Bug/Display.html?id=126755","https://github.com/Perl/perl5/issues/15067","https://packetstormsecurity.com/files/136649/Perl-5.22-VDir-MapPathA-W-Out-Of-Bounds-Reads-Buffer-Over-Reads.html","http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","https://www.oracle.com/security-alerts/cpujul2020.html"],"affected_versions":[">=5.005,<5.24.0"],"severity":"critical","distribution":"perl","description":"The VDir::MapPathA and VDir::MapPathW functions in Perl 5.22 allow remote attackers to cause a denial of service (out-of-bounds read) and possibly execute arbitrary code via a crafted (1) drive letter or (2) pInName argument.\n","cves":["CVE-2015-8608"],"reported":"2017-02-07","fixed_versions":[">=5.24.0"],"id":"CPANSA-perl-2015-8608"},{"id":"CPANSA-perl-2011-2728","distribution":"perl","description":"The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.\n","cves":["CVE-2011-2728"],"reported":"2012-12-21","fixed_versions":[],"severity":null,"affected_versions":["<5.14.2"],"references":["http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069752.html","http://www.securityfocus.com/bid/49858","http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod","http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77","http://secunia.com/advisories/46172","https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1","https://bugzilla.redhat.com/show_bug.cgi?id=742987"]},{"id":"CPANSA-perl-2020-12723","distribution":"perl","description":"regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.\n","cves":["CVE-2020-12723"],"reported":"2020-06-05","fixed_versions":[">=5.30.3"],"severity":"high","affected_versions":["<5.28.3",">=5.30.0,<5.30.3"],"references":["https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3","https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod","https://github.com/Perl/perl5/issues/16947","https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a","https://github.com/Perl/perl5/issues/17743","https://security.netapp.com/advisory/ntap-20200611-0001/","https://security.gentoo.org/glsa/202006-03","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuoct2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://perldoc.perl.org/perl5283delta","https://perldoc.perl.org/perl5303delta","https://perldoc.perl.org/perl5320delta"]},{"severity":"high","affected_versions":["<5.28.3",">=5.30.0,<5.30.3"],"references":["https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3","https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c","https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8","https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod","https://security.netapp.com/advisory/ntap-20200611-0001/","https://security.gentoo.org/glsa/202006-03","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuoct2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://perldoc.perl.org/perl5283delta","https://perldoc.perl.org/perl5303delta","https://perldoc.perl.org/perl5320delta"],"id":"CPANSA-perl-2020-10878","distribution":"perl","description":"Perl before 5.30.3 has an integer overflow related to mishandling of a \"PL_regkind[OP(n)] == NOTHING\" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.\n","reported":"2020-06-05","cves":["CVE-2020-10878"],"fixed_versions":[">=5.30.3"]},{"affected_versions":["<5.28.3",">=5.30.0,<5.30.3"],"references":["https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3","https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed","https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod","https://security.netapp.com/advisory/ntap-20200611-0001/","https://security.gentoo.org/glsa/202006-03","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuoct2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://perldoc.perl.org/perl5283delta","https://perldoc.perl.org/perl5303delta","https://perldoc.perl.org/perl5320delta"],"severity":"high","description":"Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.\n","distribution":"perl","reported":"2020-06-05","cves":["CVE-2020-10543"],"fixed_versions":[">=5.30.3"],"id":"CPANSA-perl-2020-10543"},{"references":["https://www.debian.org/security/2018/dsa-4172","https://rt.perl.org/Public/Bug/Display.html?id=132063","http://www.securitytracker.com/id/1040681","https://access.redhat.com/errata/RHSA-2018:1192","https://usn.ubuntu.com/3625-1/","https://security.gentoo.org/glsa/201909-01","https://www.oracle.com/security-alerts/cpujul2020.html","https://perldoc.perl.org/perl5244delta","https://perldoc.perl.org/perl5262delta","https://github.com/Perl/perl5/issues/16143"],"affected_versions":[">=5.22.0,<5.24.4",">=5.26.0,<5.28.2"],"severity":"high","cves":["CVE-2018-6798"],"reported":"2018-04-17","fixed_versions":[">=5.28.0"],"description":"An issue was discovered in Perl 5.22 through 5.26. Matching a crafted locale dependent regular expression can cause a heap-based buffer over-read and potentially information disclosure.\n","distribution":"perl","id":"CPANSA-perl-2018-6798"},{"id":"CPANSA-perl-2018-6797","reported":"2018-04-17","cves":["CVE-2018-6797"],"fixed_versions":[">=5.28.0"],"distribution":"perl","description":"An issue was discovered in Perl 5.18 through 5.26. A crafted regular expression can cause a heap-based buffer overflow, with control over the bytes written.\n","severity":"critical","affected_versions":[">=5.18.0,<5.24.4",">=5.26.0,<5.26.2"],"references":["https://www.debian.org/security/2018/dsa-4172","https://rt.perl.org/Public/Bug/Display.html?id=132227","http://www.securitytracker.com/id/1040681","https://access.redhat.com/errata/RHSA-2018:1192","https://usn.ubuntu.com/3625-1/","http://www.securitytracker.com/id/1042004","https://security.gentoo.org/glsa/201909-01","https://www.oracle.com/security-alerts/cpujul2020.html","https://perldoc.perl.org/perl5244delta","https://perldoc.perl.org/perl5262delta"]},{"id":"CPANSA-perl-2018-6913","reported":"2018-04-17","fixed_versions":[">=5.26.2"],"cves":["CVE-2018-6913"],"distribution":"perl","description":"Heap-based buffer overflow in the pack function in Perl before 5.26.2 allows context-dependent attackers to execute arbitrary code via a large item count.\n","severity":"critical","references":["https://www.debian.org/security/2018/dsa-4172","https://rt.perl.org/Public/Bug/Display.html?id=131844","https://lists.debian.org/debian-lts-announce/2018/04/msg00009.html","http://www.securitytracker.com/id/1040681","https://usn.ubuntu.com/3625-2/","https://usn.ubuntu.com/3625-1/","http://www.securityfocus.com/bid/103953","https://security.gentoo.org/glsa/201909-01","https://www.oracle.com/security-alerts/cpujul2020.html","https://perldoc.perl.org/perl5244delta","https://perldoc.perl.org/perl5262delta","https://github.com/Perl/perl5/issues/16098"],"affected_versions":["<5.24.4",">=5.26.0,<5.26.2"]},{"id":"CPANSA-perl-2018-18314","distribution":"perl","description":"Perl before 5.26.3 has a buffer overflow via a crafted regular expression that triggers invalid write operations.\n","cves":["CVE-2018-18314"],"reported":"2018-12-07","fixed_versions":[">=5.26.3"],"severity":"critical","references":["https://www.debian.org/security/2018/dsa-4347","https://rt.perl.org/Ticket/Display.html?id=131649","https://metacpan.org/changes/release/SHAY/perl-5.26.3","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/","https://github.com/Perl/perl5/commit/19a498a461d7c81ae3507c450953d1148efecf4f","https://bugzilla.redhat.com/show_bug.cgi?id=1646751","http://www.securitytracker.com/id/1042181","https://usn.ubuntu.com/3834-1/","http://www.securityfocus.com/bid/106145","https://access.redhat.com/errata/RHSA-2019:0010","https://access.redhat.com/errata/RHSA-2019:0001","https://security.netapp.com/advisory/ntap-20190221-0003/","https://security.gentoo.org/glsa/201909-01","https://www.oracle.com/security-alerts/cpujul2020.html"],"affected_versions":["<5.26.3"]},{"fixed_versions":[">=5.26.3"],"reported":"2018-12-07","cves":["CVE-2018-18313"],"distribution":"perl","description":"Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory.\n","id":"CPANSA-perl-2018-18313","affected_versions":["<5.26.3"],"references":["https://www.debian.org/security/2018/dsa-4347","https://usn.ubuntu.com/3834-2/","https://rt.perl.org/Ticket/Display.html?id=133192","https://metacpan.org/changes/release/SHAY/perl-5.26.3","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/","https://github.com/Perl/perl5/commit/43b2f4ef399e2fd7240b4eeb0658686ad95f8e62","https://bugzilla.redhat.com/show_bug.cgi?id=1646738","http://www.securitytracker.com/id/1042181","https://usn.ubuntu.com/3834-1/","https://access.redhat.com/errata/RHSA-2019:0010","https://access.redhat.com/errata/RHSA-2019:0001","https://security.netapp.com/advisory/ntap-20190221-0003/","https://support.apple.com/kb/HT209600","https://seclists.org/bugtraq/2019/Mar/42","http://seclists.org/fulldisclosure/2019/Mar/49","https://security.gentoo.org/glsa/201909-01","https://www.oracle.com/security-alerts/cpujul2020.html"],"severity":"critical"},{"severity":"critical","references":["https://www.debian.org/security/2018/dsa-4347","https://rt.perl.org/Public/Bug/Display.html?id=133423","https://metacpan.org/changes/release/SHAY/perl-5.28.1","https://metacpan.org/changes/release/SHAY/perl-5.26.3","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/","https://bugzilla.redhat.com/show_bug.cgi?id=1646734","http://www.securitytracker.com/id/1042181","https://usn.ubuntu.com/3834-1/","http://www.securityfocus.com/bid/106179","https://access.redhat.com/errata/RHSA-2019:0010","https://access.redhat.com/errata/RHSA-2019:0001","https://security.netapp.com/advisory/ntap-20190221-0003/","https://security.gentoo.org/glsa/201909-01","https://www.oracle.com/security-alerts/cpujul2020.html","https://perldoc.perl.org/perl5281delta","https://perldoc.perl.org/perl5263delta"],"affected_versions":["==5.28.0","<5.26.3"],"id":"CPANSA-perl-2018-18312","distribution":"perl","description":"Perl before 5.26.3 and 5.28.0 before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.\n","reported":"2018-12-05","fixed_versions":[">=5.28.1"],"cves":["CVE-2018-18312"]},{"severity":"critical","references":["https://www.debian.org/security/2018/dsa-4347","https://usn.ubuntu.com/3834-2/","https://rt.perl.org/Ticket/Display.html?id=133204","https://metacpan.org/changes/release/SHAY/perl-5.28.1","https://metacpan.org/changes/release/SHAY/perl-5.26.3","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/","https://lists.debian.org/debian-lts-announce/2018/11/msg00039.html","https://github.com/Perl/perl5/commit/34716e2a6ee2af96078d62b065b7785c001194be","https://bugzilla.redhat.com/show_bug.cgi?id=1646730","http://www.securitytracker.com/id/1042181","https://usn.ubuntu.com/3834-1/","http://www.securityfocus.com/bid/106145","https://access.redhat.com/errata/RHSA-2019:0010","https://access.redhat.com/errata/RHSA-2019:0001","https://access.redhat.com/errata/RHSA-2019:0109","https://security.netapp.com/advisory/ntap-20190221-0003/","https://support.apple.com/kb/HT209600","https://seclists.org/bugtraq/2019/Mar/42","http://seclists.org/fulldisclosure/2019/Mar/49","https://kc.mcafee.com/corporate/index?page=content&id=SB10278","https://access.redhat.com/errata/RHBA-2019:0327","https://access.redhat.com/errata/RHSA-2019:1790","https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","https://access.redhat.com/errata/RHSA-2019:1942","https://access.redhat.com/errata/RHSA-2019:2400","https://security.gentoo.org/glsa/201909-01","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://perldoc.perl.org/perl5281delta","https://perldoc.perl.org/perl5263delta"],"affected_versions":["<5.26.3","==5.28.0"],"id":"CPANSA-perl-2018-18311","cves":["CVE-2018-18311"],"reported":"2018-12-07","fixed_versions":[">=5.28.1"],"distribution":"perl","description":"Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.\n"},{"references":["https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1","https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1","https://perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300f#patch1","https://bugzilla.redhat.com/show_bug.cgi?id=1492093","http://www.securityfocus.com/bid/100852","http://mirror.cucumberlinux.com/cucumber/cucumber-1.0/source/lang-base/perl/patches/CVE-2017-12883.patch","https://rt.perl.org/Public/Bug/Display.html?id=131598","http://www.debian.org/security/2017/dsa-3982","https://security.netapp.com/advisory/ntap-20180426-0001/","https://www.oracle.com/security-alerts/cpujul2020.html","https://github.com/Perl/perl5/issues/16025","https://perldoc.perl.org/perl5243delta","https://perldoc.perl.org/perl5280delta","https://perldoc.perl.org/perl5261delta"],"affected_versions":["==5.26.0",">=5.20.0,<5.24.3"],"severity":"critical","description":"Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information or cause a denial of service (application crash) via a crafted regular expression with an invalid '\\\\N{U+...}' escape.\n","distribution":"perl","reported":"2017-09-19","fixed_versions":[">=5.26.1"],"cves":["CVE-2017-12883"],"id":"CPANSA-perl-2017-12883"},{"references":["https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1","https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1","https://perl5.git.perl.org/perl.git/commitdiff/96c83ed78aeea1a0496dd2b2d935869a822dc8a5","https://bugzilla.redhat.com/show_bug.cgi?id=1492091","http://www.securityfocus.com/bid/100860","https://rt.perl.org/Public/Bug/Display.html?id=131582","http://www.debian.org/security/2017/dsa-3982","https://security.netapp.com/advisory/ntap-20180426-0001/","https://www.oracle.com/security-alerts/cpujul2020.html","https://github.com/Perl/perl5/issues/16021","https://perldoc.perl.org/perl5243delta","https://perldoc.perl.org/perl5261delta","https://perldoc.perl.org/perl5280delta"],"affected_versions":[">=5.18.0,<5.24.3","==5.26.0"],"severity":"high","description":"Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to cause a denial of service (out-of-bounds write) via a regular expression with a '\\\\N{}' escape and the case-insensitive modifier.\n","distribution":"perl","reported":"2017-09-19","fixed_versions":[">=5.26.1"],"cves":["CVE-2017-12837"],"id":"CPANSA-perl-2017-12837"},{"affected_versions":["<5.24.0"],"references":["http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html","http://www.openwall.com/lists/oss-security/2016/04/20/7","https://bugzilla.redhat.com/show_bug.cgi?id=1329106","https://rt.perl.org/Public/Bug/Display.html?id=123562","http://www.openwall.com/lists/oss-security/2016/04/20/5","http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html","http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","http://www.securityfocus.com/bid/86707","https://security.gentoo.org/glsa/201701-75","https://usn.ubuntu.com/3625-2/","https://usn.ubuntu.com/3625-1/"],"severity":"high","cves":["CVE-2015-8853"],"reported":"2016-05-25","fixed_versions":[">=5.24.0"],"description":"The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by \"a\\x80.\"\n","distribution":"perl","id":"CPANSA-perl-2015-8853"},{"affected_versions":["<5.18.0"],"references":["http://www.securityfocus.com/bid/58311","http://perl5.git.perl.org/perl.git/commitdiff/d59e31f","http://perl5.git.perl.org/perl.git/commitdiff/9d83adc","http://www.nntp.perl.org/group/perl.perl5.porters/2013/03/msg199755.html","http://www.debian.org/security/2013/dsa-2641","http://secunia.com/advisories/52499","http://secunia.com/advisories/52472","https://bugzilla.redhat.com/show_bug.cgi?id=912276","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702296","http://perl5.git.perl.org/perl.git/commitdiff/6e79fe5","http://osvdb.org/90892","http://www.ubuntu.com/usn/USN-1770-1","http://rhn.redhat.com/errata/RHSA-2013-0685.html","http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html","http://marc.info/?l=bugtraq&m=137891988921058&w=2","http://www.mandriva.com/security/advisories?name=MDVSA-2013:113","https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0094","http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","https://exchange.xforce.ibmcloud.com/vulnerabilities/82598","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18771"],"severity":null,"fixed_versions":[">=5.26.1"],"reported":"2013-03-14","cves":["CVE-2013-1667"],"distribution":"perl","description":"The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.\n","id":"CPANSA-perl-2013-1667"},{"id":"CPANSA-perl-2011-0761","fixed_versions":[">=5.12.0"],"reported":"2011-05-13","cves":["CVE-2011-0761"],"description":"Perl 5.10.x allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an ability to inject arguments into a (1) getpeername, (2) readdir, (3) closedir, (4) getsockname, (5) rewinddir, (6) tell, or (7) telldir function call.\n","distribution":"perl","severity":null,"references":["http://www.securityfocus.com/bid/47766","http://securitytracker.com/id?1025507","http://www.toucan-system.com/advisories/tssa-2011-03.txt","http://securityreason.com/securityalert/8248","https://exchange.xforce.ibmcloud.com/vulnerabilities/67355","http://www.securityfocus.com/archive/1/517916/100/0/threaded"],"affected_versions":[">=5.10.0,<5.12.0"]},{"id":"CPANSA-perl-2010-4777","distribution":"perl","description":"The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0, 5.14.0, and other versions, when running with debugging enabled, allows context-dependent attackers to cause a denial of service (assertion failure and application exit) via crafted input that is not properly handled when using certain regular expressions, as demonstrated by causing SpamAssassin and OCSInventory to crash.\n","reported":"2014-02-10","fixed_versions":[">5.14.0"],"cves":["CVE-2010-4777"],"severity":null,"references":["http://lists.opensuse.org/opensuse-updates/2011-05/msg00025.html","https://bugzilla.redhat.com/show_bug.cgi?id=694166","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628836","https://rt.perl.org/Public/Bug/Display.html?id=76538","https://listi.jpberlin.de/pipermail/postfixbuch-users/2011-February/055885.html","http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html","http://forums.ocsinventory-ng.org/viewtopic.php?id=7215"],"affected_versions":["<=5.14.0"]},{"id":"CPANSA-perl-2010-1158","fixed_versions":[">=5.10.0"],"reported":"2010-04-20","cves":["CVE-2010-1158"],"description":"Integer overflow in the regular expression engine in Perl 5.8.x allows context-dependent attackers to cause a denial of service (stack consumption and application crash) by matching a crafted regular expression against a long string.\n","distribution":"perl","severity":null,"affected_versions":["<5.10.0"],"references":["http://bugs.gentoo.org/show_bug.cgi?id=313565","http://www.openwall.com/lists/oss-security/2010/04/14/3","http://perldoc.perl.org/perl5100delta.html","http://www.openwall.com/lists/oss-security/2010/04/08/9","https://bugzilla.redhat.com/show_bug.cgi?id=580605","http://secunia.com/advisories/55314"]},{"affected_versions":["<=5.10.1"],"references":["http://securitytracker.com/id?1023077","http://www.vupen.com/english/advisories/2009/3023","http://perl5.git.perl.org/perl.git/commit/0abd0d78a73da1c4d13b1c700526b7e5d03b32d4","http://www.securityfocus.com/bid/36812","https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6225","http://rt.perl.org/rt3/Ticket/Attachment/617489/295383/","http://www.osvdb.org/59283","http://www.openwall.com/lists/oss-security/2009/10/23/8","http://secunia.com/advisories/37144","http://rt.perl.org/rt3/Public/Bug/Display.html?id=69973","https://exchange.xforce.ibmcloud.com/vulnerabilities/53939"],"severity":null,"cves":["CVE-2009-3626"],"reported":"2009-10-29","fixed_versions":[],"distribution":"perl","description":"Perl 5.10.1 allows context-dependent attackers to cause a denial of service (application crash) via a UTF-8 character with a large, invalid codepoint, which is not properly handled during a regular-expression match.\n","id":"CPANSA-perl-2009-3626"},{"references":["http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792","http://www.debian.org/security/2008/dsa-1556","https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00601.html","https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00607.html","http://www.gentoo.org/security/en/glsa/glsa-200805-17.xml","http://www.securityfocus.com/bid/28928","http://secunia.com/advisories/29948","http://secunia.com/advisories/30025","http://secunia.com/advisories/30326","http://www.securitytracker.com/id?1020253","http://www.redhat.com/support/errata/RHSA-2008-0522.html","http://secunia.com/advisories/30624","http://support.avaya.com/elmodocs2/security/ASA-2008-317.htm","http://support.avaya.com/elmodocs2/security/ASA-2008-361.htm","http://www.ipcop.org/index.php?name=News&file=article&sid=41","http://secunia.com/advisories/31467","http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html","http://secunia.com/advisories/31604","http://secunia.com/advisories/31208","http://secunia.com/advisories/31328","http://www.vmware.com/security/advisories/VMSA-2008-0013.html","http://www.redhat.com/support/errata/RHSA-2008-0532.html","http://secunia.com/advisories/31687","http://osvdb.org/44588","http://www.mandriva.com/security/advisories?name=MDVSA-2008:100","http://www.ubuntu.com/usn/usn-700-1","http://secunia.com/advisories/33314","http://wiki.rpath.com/Advisories:rPSA-2009-0011","http://www.ubuntu.com/usn/usn-700-2","http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html","http://secunia.com/advisories/33937","http://support.apple.com/kb/HT3438","http://www.vupen.com/english/advisories/2009/0422","http://www.vupen.com/english/advisories/2008/2361","http://www.vupen.com/english/advisories/2008/2424","http://www.vupen.com/english/advisories/2008/2265/references","https://exchange.xforce.ibmcloud.com/vulnerabilities/41996","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10579","http://www.securityfocus.com/archive/1/500210/100/0/threaded"],"affected_versions":["<=5.8.8"],"severity":null,"reported":"2008-04-24","fixed_versions":[],"cves":["CVE-2008-1927"],"distribution":"perl","description":"Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems.\n","id":"CPANSA-perl-2008-1927"},{"severity":null,"references":["http://www.dyadsecurity.com/perl-0002.html","http://www.kb.cert.org/vuls/id/948385","http://www.securityfocus.com/bid/15629","http://secunia.com/advisories/17802","http://secunia.com/advisories/17844","http://secunia.com/advisories/17762","http://www.openpkg.org/security/OpenPKG-SA-2005.025-perl.html","http://www.gentoo.org/security/en/glsa/glsa-200512-01.xml","http://www.trustix.org/errata/2005/0070","http://secunia.com/advisories/17941","http://secunia.com/advisories/17952","http://www.redhat.com/support/errata/RHSA-2005-880.html","http://www.novell.com/linux/security/advisories/2005_71_perl.html","http://secunia.com/advisories/18183","http://secunia.com/advisories/18187","http://www.redhat.com/support/errata/RHSA-2005-881.html","http://secunia.com/advisories/18075","http://www.openbsd.org/errata37.html#perl","http://secunia.com/advisories/18295","ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/001_perl.patch","http://www.osvdb.org/21345","http://www.osvdb.org/22255","ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U","http://secunia.com/advisories/18517","http://secunia.com/advisories/17993","https://www.redhat.com/archives/fedora-legacy-announce/2006-February/msg00008.html","http://sunsolve.sun.com/search/document.do?assetkey=1-26-102192-1","http://secunia.com/advisories/19041","http://www.debian.org/security/2006/dsa-943","http://secunia.com/advisories/18413","http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056","http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm","http://www.novell.com/linux/security/advisories/2005_29_sr.html","http://secunia.com/advisories/20894","http://docs.info.apple.com/article.html?artnum=304829","http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html","http://www.us-cert.gov/cas/techalerts/TA06-333A.html","http://secunia.com/advisories/23155","http://www.mandriva.com/security/advisories?name=MDKSA-2005:225","http://www.ipcop.org/index.php?name=News&file=article&sid=41","http://secunia.com/advisories/31208","http://www.vupen.com/english/advisories/2006/2613","http://www.vupen.com/english/advisories/2006/0771","http://www.vupen.com/english/advisories/2006/4750","ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/007_perl.patch","http://www.vupen.com/english/advisories/2005/2688","http://marc.info/?l=full-disclosure&m=113342788118630&w=2","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1074","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10598","https://usn.ubuntu.com/222-1/","http://www.securityfocus.com/archive/1/438726/100/0/threaded","http://www.securityfocus.com/archive/1/418333/100/0/threaded"],"affected_versions":["<5.10.0"],"id":"CPANSA-perl-2005-3962","distribution":"perl","description":"Integer overflow in the format string functionality (Perl_sv_vcatpvfn) in Perl 5.9.2 and 5.8.6 Perl allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an integer wrap and leads to a buffer overflow, as demonstrated using format string vulnerabilities in Perl applications.\n","cves":["CVE-2005-3962"],"reported":"2005-12-01","fixed_versions":[]},{"severity":null,"affected_versions":["=5.8.0"],"references":["http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml","http://www.redhat.com/support/errata/RHSA-2005-103.html","http://www.redhat.com/support/errata/RHSA-2005-105.html","http://www.trustix.org/errata/2005/0003/","http://www.securityfocus.com/bid/12426","http://secunia.com/advisories/14120","http://fedoranews.org/updates/FEDORA--.shtml","http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056","http://www.mandriva.com/security/advisories?name=MDKSA-2005:031","http://secunia.com/advisories/55314","http://marc.info/?l=bugtraq&m=110737149402683&w=2","http://marc.info/?l=full-disclosure&m=110779721503111&w=2","https://exchange.xforce.ibmcloud.com/vulnerabilities/19208","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803","http://www.digitalmunition.com/DMA[2005-0131b].txt"],"id":"CPANSA-perl-2005-0156","reported":"2005-02-07","fixed_versions":[],"cves":["CVE-2005-0156"],"description":"Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.\n","distribution":"perl"},{"severity":null,"affected_versions":["=5.8.0"],"references":["http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml","http://www.redhat.com/support/errata/RHSA-2005-103.html","http://www.redhat.com/support/errata/RHSA-2005-105.html","http://www.trustix.org/errata/2005/0003/","http://www.securityfocus.com/bid/12426","http://secunia.com/advisories/14120","http://fedoranews.org/updates/FEDORA--.shtml","http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056","http://support.avaya.com/elmodocs2/security/ASA-2006-163.htm","http://secunia.com/advisories/21646","http://www.mandriva.com/security/advisories?name=MDKSA-2005:031","http://marc.info/?l=bugtraq&m=110737149402683&w=2","http://marc.info/?l=full-disclosure&m=110779723332339&w=2","https://exchange.xforce.ibmcloud.com/vulnerabilities/19207","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10404","http://www.digitalmunition.com/DMA[2005-0131a].txt"],"id":"CPANSA-perl-2005-0155","cves":["CVE-2005-0155"],"reported":"2005-05-02","fixed_versions":[],"distribution":"perl","description":"The PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to create arbitrary files via the PERLIO_DEBUG variable.\n"},{"id":"CPANSA-perl-2007-5116","distribution":"perl","description":"Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.\n","cves":["CVE-2007-5116"],"reported":"2007-11-07","fixed_versions":[],"severity":null,"affected_versions":["<=5.8.8"],"references":["https://bugzilla.redhat.com/show_bug.cgi?id=323571","http://www.mandriva.com/security/advisories?name=MDKSA-2007:207","http://www.redhat.com/support/errata/RHSA-2007-0966.html","http://www.redhat.com/support/errata/RHSA-2007-1011.html","http://www.securityfocus.com/bid/26350","http://secunia.com/advisories/27531","http://secunia.com/advisories/27546","https://bugzilla.redhat.com/show_bug.cgi?id=378131","https://issues.rpath.com/browse/RPL-1813","http://www.debian.org/security/2007/dsa-1400","http://www.gentoo.org/security/en/glsa/glsa-200711-28.xml","http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.023.html","http://www.novell.com/linux/security/advisories/2007_24_sr.html","http://www.ubuntu.com/usn/usn-552-1","http://securitytracker.com/id?1018899","http://secunia.com/advisories/27479","http://secunia.com/advisories/27515","http://secunia.com/advisories/27548","http://secunia.com/advisories/27613","http://secunia.com/advisories/27570","http://secunia.com/advisories/27936","http://docs.info.apple.com/article.html?artnum=307179","ftp://aix.software.ibm.com/aix/efixes/security/README","http://www-1.ibm.com/support/docview.wss?uid=isg1IZ10220","http://www-1.ibm.com/support/docview.wss?uid=isg1IZ10244","http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html","http://www.us-cert.gov/cas/techalerts/TA07-352A.html","http://secunia.com/advisories/28167","http://lists.vmware.com/pipermail/security-announce/2008/000002.html","http://support.avaya.com/elmodocs2/security/ASA-2008-014.htm","http://secunia.com/advisories/28368","http://secunia.com/advisories/28387","http://secunia.com/advisories/27756","http://www.vmware.com/security/advisories/VMSA-2008-0001.html","http://sunsolve.sun.com/search/document.do?assetkey=1-26-31524-1","http://secunia.com/advisories/28993","http://secunia.com/advisories/29074","http://sunsolve.sun.com/search/document.do?assetkey=1-66-231524-1","http://secunia.com/advisories/31208","http://www.ipcop.org/index.php?name=News&file=article&sid=41","http://sunsolve.sun.com/search/document.do?assetkey=1-77-1018985.1-1","http://www.vupen.com/english/advisories/2007/4238","http://www.vupen.com/english/advisories/2008/0064","http://www.vupen.com/english/advisories/2008/0641","http://www.vupen.com/english/advisories/2007/3724","http://www.vupen.com/english/advisories/2007/4255","http://marc.info/?l=bugtraq&m=120352263023774&w=2","https://exchange.xforce.ibmcloud.com/vulnerabilities/38270","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10669","http://www.securityfocus.com/archive/1/486859/100/0/threaded","http://www.securityfocus.com/archive/1/485936/100/0/threaded","http://www.securityfocus.com/archive/1/483584/100/0/threaded","http://www.securityfocus.com/archive/1/483563/100/0/threaded"]},{"affected_versions":["<5.16.0"],"references":["http://perl5.git.perl.org/perl.git/commit/2709980d5a193ce6f3a16f0d19879a6560dcde44","http://www.nntp.perl.org/group/perl.perl5.porters/2012/10/msg193886.html","http://www.securityfocus.com/bid/56287","http://www.openwall.com/lists/oss-security/2012/10/27/1","http://secunia.com/advisories/51457","http://www.openwall.com/lists/oss-security/2012/10/26/2","http://www.ubuntu.com/usn/USN-1643-1","http://www.debian.org/security/2012/dsa-2586","http://rhn.redhat.com/errata/RHSA-2013-0685.html","http://secunia.com/advisories/55314","http://www.mandriva.com/security/advisories?name=MDVSA-2013:113","https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0352","http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673"],"severity":null,"reported":"2012-12-18","cves":["CVE-2012-5195"],"fixed_versions":[">=5.16.0"],"description":"Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the 'x' string repeat operator.\n","distribution":"perl","id":"CPANSA-perl-2012-5195"},{"id":"CPANSA-perl-2016-2381","description":"Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.\n","distribution":"perl","reported":"2016-04-08","cves":["CVE-2016-2381"],"fixed_versions":[">=5.22.1"],"severity":"high","affected_versions":["<5.22.1"],"references":["http://www.gossamer-threads.com/lists/perl/porters/326387","http://www.debian.org/security/2016/dsa-3501","http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html","http://www.securityfocus.com/bid/83802","http://www.ubuntu.com/usn/USN-2916-1","http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html","https://security.gentoo.org/glsa/201701-75","http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/security-alerts/cpujul2020.html"]},{"distribution":"perl","description":"Perl 5.8.1 on Fedora Core does not properly initialize the random number generator when forking, which makes it easier for attackers to predict random numbers.\n","cves":["CVE-2003-0900"],"reported":"2003-12-31","fixed_versions":[],"id":"CPANSA-perl-2003-0900","references":["https://bugzilla.redhat.com/bugzilla/long_list.cgi?buglist=108711"],"affected_versions":["=5.8.1"],"severity":null},{"id":"CPANSA-perl-2013-7422","distribution":"perl","description":"Integer underflow in regcomp.c in Perl before 5.20, as used in Apple OS X before 10.10.5 and other products, allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a long digit string associated with an invalid backreference within a regular expression.\n","fixed_versions":[],"reported":"2015-08-16","cves":["CVE-2013-7422"],"severity":null,"references":["http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html","https://support.apple.com/kb/HT205031","http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06","http://www.securityfocus.com/bid/75704","http://www.ubuntu.com/usn/USN-2916-1","https://security.gentoo.org/glsa/201507-11"],"affected_versions":["<5.20.0"]},{"references":["https://rt.perl.org/Public/Bug/Display.html?id=126755","https://packetstormsecurity.com/files/136649/Perl-5.22-VDir-MapPathA-W-Out-Of-Bounds-Reads-Buffer-Over-Reads.html","http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","https://www.oracle.com/security-alerts/cpujul2020.html"],"affected_versions":["<5.22.2"],"severity":"critical","fixed_versions":[">=5.22.2"],"reported":"2017-02-07","cves":["CVE-2015-8608"],"description":"The VDir::MapPathA and VDir::MapPathW functions in Perl 5.22 allow remote attackers to cause a denial of service (out-of-bounds read) and possibly execute arbitrary code via a crafted (1) drive letter or (2) pInName argument.\n","distribution":"perl","id":"CPANSA-perl-2015-8608"},{"references":["https://bugzilla.redhat.com/show_bug.cgi?id=692844","http://openwall.com/lists/oss-security/2011/04/01/3","http://openwall.com/lists/oss-security/2011/04/04/35","https://bugzilla.redhat.com/show_bug.cgi?id=692898","http://rt.perl.org/rt3/Public/Bug/Display.html?id=87336","http://secunia.com/advisories/43921","http://www.securityfocus.com/bid/47124","http://perl5.git.perl.org/perl.git/commit/539689e74a3bcb04d29e4cd9396de91a81045b99","http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057971.html","http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057891.html","http://secunia.com/advisories/44168","http://www.debian.org/security/2011/dsa-2265","http://www.mandriva.com/security/advisories?name=MDVSA-2011:091","http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html","https://exchange.xforce.ibmcloud.com/vulnerabilities/66528"],"affected_versions":["<5.14.0"],"severity":null,"description":"The (1) lc, (2) lcfirst, (3) uc, and (4) ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.\n","distribution":"perl","reported":"2011-04-11","cves":["CVE-2011-1487"],"fixed_versions":[">=5.14.0"],"id":"CPANSA-perl-2011-1487"},{"references":["http://www.redhat.com/support/errata/rh50-errata-general.html#perl","http://www.iss.net/security_center/static/7243.php","http://marc.info/?l=bugtraq&m=88932165406213&w=2"],"affected_versions":["<5.4.4"],"severity":null,"distribution":"perl","description":"Perl 5.004_04 and earlier follows symbolic links when running with the -e option, which allows local users to overwrite arbitrary files via a symlink attack on the /tmp/perl-eaXXXXX file.\n","fixed_versions":[],"reported":"1999-12-31","cves":["CVE-1999-1386"],"id":"CPANSA-perl-1999-1386"},{"id":"CPANSA-perl-2017-12814","distribution":"perl","description":"Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable.\n","reported":"2017-09-28","fixed_versions":[],"cves":["CVE-2017-12814"],"severity":"critical","references":["https://rt.perl.org/Public/Bug/Display.html?id=131665","https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1","https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1","http://www.securityfocus.com/bid/101051","https://security.netapp.com/advisory/ntap-20180426-0001/","https://www.oracle.com/security-alerts/cpujul2020.html","https://perldoc.perl.org/perl5243delta","https://github.com/Perl/perl5/issues/16051","https://perldoc.perl.org/perl5261delta","https://perldoc.perl.org/perl5280delta"],"affected_versions":[">=5.24.0,<5.24.3","==5.26.0"]},{"id":"CPANSA-perl-2022-48522","distribution":"perl","description":"In Perl 5.34.0, function S_find_uninit_var in sv.c has a stack-based crash that can lead to remote code execution or local privilege escalation.\n","fixed_versions":[">=5.34.1"],"reported":"2023-08-22","cves":["CVE-2022-48522"],"severity":null,"references":["https://github.com/Perl/perl5/blob/79a7b254d85a10b65126ad99bf10e70480569d68/sv.c#L16336-L16345","https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48522","https://security.netapp.com/advisory/ntap-20230915-0008/","https://ubuntu.com/security/CVE-2022-48522"],"affected_versions":["=5.34.0"]},{"severity":null,"affected_versions":[">=5.30.0,<5.34.3",">=5.36.0,<5.36.3","==5.38.0"],"references":["https://perldoc.perl.org/perl5342delta","https://perldoc.perl.org/perl5363delta","https://perldoc.perl.org/perl5381delta","https://perldoc.perl.org/perl5382delta","https://perldoc.perl.org/perl5400delta"],"id":"CPANSA-perl-2023-47038","fixed_versions":["5.34.3","5.36.3","5.38.1"],"reported":"2023-10-30","cves":["CVE-2023-47038"],"distribution":"perl","description":"A crafted regular expression when compiled by perl 5.30.0 through 5.38.0 can cause a one attacker controlled byte buffer overflow in a heap allocated buffer\n"},{"references":["https://github.com/ycdxsb/WindowsPrivilegeEscalation","https://perldoc.perl.org/perl5342delta","https://perldoc.perl.org/perl5363delta","https://perldoc.perl.org/perl5381delta","https://perldoc.perl.org/perl5382delta","https://perldoc.perl.org/perl5400delta"],"affected_versions":["<5.34.2",">=5.36.0,<5.36.3","==5.38.0"],"severity":null,"cves":["CVE-2023-47039"],"reported":"2023-10-30","fixed_versions":[],"description":"Perl for Windows relies on the system path environment variable to find the shell (cmd.exe). When running an executable which uses Windows Perl interpreter, Perl attempts to find and execute cmd.exe within the operating system. However, due to path search order issues, Perl initially looks for cmd.exe in the current working directory.\nAn attacker with limited privileges can exploit this behavior by placing cmd.exe in locations with weak permissions, such as C:\\ProgramData. By doing so, when an administrator attempts to use this executable from these compromised locations, arbitrary code can be executed.\n","distribution":"perl","id":"CPANSA-perl-2023-47039"},{"severity":null,"affected_versions":["<5.34.3",">=5.36.0,<5.36.3",">=5.38.0,<5.38.2"],"references":["https://github.com/Perl/perl5/commit/ff1f9f59360afeebd6f75ca1502f5c3ebf077da3","https://github.com/Perl/perl5/commit/12c313ce49b36160a7ca2e9b07ad5bd92ee4a010","https://github.com/Perl/perl5/commit/7047915eef37fccd93e7cd985c29fe6be54650b6"],"id":"CPANSA-perl-2023-47100","reported":null,"cves":["CVE-2023-47100"],"fixed_versions":[">=5.38.2"],"description":"In Perl before 5.38.2, S_parse_uniprop_string in regcomp.c can write to unallocated space because a property name associated with a \\p{...} regular expression construct is mishandled. The earliest affected version is 5.30.0.\n","distribution":"perl"},{"id":"CPANSA-perl-2024-56406","reported":"2025-04-13","cves":["CVE-2024-56406"],"fixed_versions":[">=5.40.1",">=5.38.4,<5.40.0"],"description":"A heap buffer overflow vulnerability was discovered in Perl. When there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.    $ perl -e '$_ = \"\\x{FF}\" x 1000000; tr/\\xFF/\\x{100}/;'    Segmentation fault (core dumped) It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.","distribution":"perl","severity":null,"affected_versions":[">0,<5.38.4",">=5.40.0,<5.40.2"],"references":["https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch","https://metacpan.org/release/SHAY/perl-5.38.4/changes","https://metacpan.org/release/SHAY/perl-5.40.2/changes","http://www.openwall.com/lists/oss-security/2025/04/13/3","http://www.openwall.com/lists/oss-security/2025/04/13/4"]},{"affected_versions":[">=4.0,<5.4.0"],"references":["https://exchange.xforce.ibmcloud.com/vulnerabilities/448","https://www.cpan.org/src/5.0/CA-97.17.sperl"],"severity":null,"reported":"1997-05-29","fixed_versions":[],"cves":["CVE-1999-0034"],"distribution":"perl","description":"Buffer overflow in suidperl (sperl), Perl 4.x and 5.x.\n","id":"CPANSA-sperl-1999-0034"},{"affected_versions":[">=4.0,<5.6.0"],"references":["http://www.securityfocus.com/bid/339"],"severity":null,"cves":["CVE-1999-0462"],"reported":"1999-03-17","fixed_versions":[],"description":"suidperl in Linux Perl does not check the nosuid mount option on file systems, allowing local users to gain root access by placing a setuid script in a mountable file system, e.g. a CD-ROM or floppy disk.\n","distribution":"perl","id":"CPANSA-sperl-1999-0462"},{"severity":null,"affected_versions":["<5.6.1"],"references":["http://archives.neohapsis.com/archives/bugtraq/2000-08/0022.html","http://www.calderasystems.com/support/security/advisories/CSSA-2000-026.0.txt","http://www.securityfocus.com/bid/1547","http://www.novell.com/linux/security/advisories/suse_security_announce_59.html","http://www.redhat.com/support/errata/RHSA-2000-048.html","http://www.turbolinux.com/pipermail/tl-security-announce/2000-August/000017.html","http://archives.neohapsis.com/archives/bugtraq/2000-08/0153.html","http://archives.neohapsis.com/archives/bugtraq/2000-08/0086.html","http://archives.neohapsis.com/archives/bugtraq/2000-08/0113.html","https://www.cpan.org/src/5.0/sperl-2000-08-05/sperl-2000-08-05.txt"],"id":"CPANSA-sperl-2000-0703","reported":"2000-10-20","fixed_versions":[],"cves":["CVE-2000-0703"],"distribution":"perl","description":"suidperl (aka sperl) does not properly cleanse the escape sequence \"~!\" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the \"interactive\" environmental variable and calling suidperl with a filename that contains the escape sequence.\n"}],"main_module":"perl","versions":[{"date":"1996-02-03T07:48:14","version":"5.002"},{"version":"5.003_02","date":"1996-08-08T23:13:50"},{"version":"5.003_02","date":"1996-08-10T19:07:27"},{"version":"5.003_03","date":"1996-08-28T16:43:47"},{"date":"1996-09-02T23:25:30","version":"5.003_04"},{"date":"1996-09-12T20:10:42","version":"5.003_05"},{"version":"5.003_06","date":"1996-10-08T21:59:27"},{"date":"1996-10-11T03:39:44","version":"5.003_07"},{"version":"5.003_08","date":"1996-11-19T07:27:23"},{"version":"5.003_09","date":"1996-11-26T09:46:17"},{"version":"5.003_10","date":"1996-11-30T01:22:23"},{"version":"5.003_11","date":"1996-12-06T09:08:18"},{"version":"5.003_12","date":"1996-12-19T04:59:47"},{"version":"5.003_13","date":"1996-12-20T02:59:16"},{"date":"1996-12-23T22:09:26","version":"5.003_15"},{"version":"5.003_16","date":"1996-12-24T23:22:02"},{"date":"1996-12-27T20:20:05","version":"5.003_17"},{"version":"5.003_18","date":"1996-12-31T21:35:40"},{"version":"5.003_19","date":"1997-01-04T06:02:28"},{"date":"1997-01-08T02:15:49","version":"5.003_20"},{"version":"5.003_21","date":"1997-01-15T23:12:15"},{"date":"1997-01-16T20:04:16","version":"5.003_22"},{"date":"1997-01-25T10:04:29","version":"5.003_23"},{"date":"1997-01-29T06:05:11","version":"5.003_24"},{"date":"1997-02-04T05:41:02","version":"5.003_25"},{"version":"5.003_26","date":"1997-02-10T19:37:44"},{"version":"5.003_27","date":"1997-02-18T01:13:23"},{"version":"5.003_28","date":"1997-02-21T17:17:57"},{"date":"1997-02-25T03:29:59","version":"5.003_90"},{"date":"1997-03-01T08:08:54","version":"5.003_91"},{"date":"1997-03-06T18:24:17","version":"5.003_92"},{"date":"1997-03-10T12:06:55","version":"5.003_93"},{"date":"1997-03-22T05:43:00","version":"5.003_94"},{"version":"5.003_95","date":"1997-03-25T19:52:24"},{"version":"5.003_96","date":"1997-04-01T00:50:13"},{"date":"1997-04-03T00:50:37","version":"5.003_97"},{"date":"1997-04-24T00:56:53","version":"5.003_97"},{"date":"1997-04-25T03:44:34","version":"5.003_97"},{"version":"5.003_97","date":"1997-04-28T20:33:01"},{"version":"5.003_98","date":"1997-04-30T15:40:09"},{"date":"1997-05-01T18:40:08","version":"5.003_99"},{"version":"5.003_99","date":"1997-05-09T05:37:58"},{"version":"5.004","date":"1997-05-15T22:54:01"},{"date":"1997-06-13T15:08:00","version":"5.004_01"},{"version":"5.004_02","date":"1997-08-07T20:07:25"},{"version":"5.004_03","date":"1997-09-05T17:46:00"},{"date":"1997-09-05T18:13:00","version":"5.004"},{"version":"5.004","date":"1997-09-19T18:22:20"},{"date":"1997-09-23T06:21:18","version":"5.004"},{"version":"5.004_51","date":"1997-10-02T16:49:00"},{"date":"1997-10-09T23:16:38","version":"5.004"},{"version":"5.004","date":"1997-10-14T19:19:40"},{"version":"5.004_52","date":"1997-10-15T16:17:00"},{"date":"1997-10-15T16:28:24","version":"5.004_04"},{"version":"5.004_53","date":"1997-10-16T16:24:00"},{"date":"1997-11-14T17:04:00","version":"5.004_54"},{"date":"1997-11-25T17:17:00","version":"5.004_55"},{"version":"5.004_56","date":"1997-12-18T16:20:00"},{"date":"1998-02-03T15:06:00","version":"5.004_57"},{"date":"1998-02-06T17:25:00","version":"5.004_58"},{"date":"1998-02-13T16:42:00","version":"5.004_59"},{"date":"1998-02-20T17:42:00","version":"5.004_60"},{"date":"1998-02-27T17:55:00","version":"5.004_61"},{"version":"5.004","date":"1998-03-04T19:46:42"},{"version":"5.004_62","date":"1998-03-06T15:27:00"},{"date":"1998-03-17T15:29:00","version":"5.004_63"},{"date":"1998-04-03T15:44:00","version":"5.004_64"},{"version":"5.004_04","date":"1998-05-01T23:37:24"},{"date":"1998-05-15T15:57:00","version":"5.004_65"},{"date":"1998-05-15T23:46:53","version":"5.004_04"},{"date":"1998-05-19T23:51:10","version":"5.004_04"},{"version":"5.004_66","date":"1998-05-29T15:23:00"},{"version":"5.004_67","date":"1998-06-15T11:47:27"},{"date":"1998-06-23T11:50:59","version":"5.004_68"},{"version":"5.004_69","date":"1998-06-29T09:42:04"},{"date":"1998-07-06T08:22:24","version":"5.004_70"},{"date":"1998-07-09T13:47:36","version":"5.004_71"},{"version":"5.004_72","date":"1998-07-12T13:32:41"},{"date":"1998-07-13T09:17:14","version":"5.004_73"},{"version":"5.004_74","date":"1998-07-14T10:31:15"},{"date":"1998-07-15T11:29:51","version":"5.005"},{"version":"5.004_05","date":"1998-07-21T05:16:24"},{"date":"1998-07-21T11:36:27","version":"5.005"},{"version":"5.005","date":"1998-07-23T00:55:19"},{"version":"5.005_50","date":"1998-07-26T06:20:30"},{"version":"5.005_01","date":"1998-07-27T00:16:22"},{"version":"5.005_02","date":"1998-08-02T10:32:29"},{"version":"5.005_02","date":"1998-08-05T10:49:59"},{"date":"1998-08-08T05:46:05","version":"5.005_02"},{"version":"5.005_51","date":"1998-08-10T08:33:23"},{"version":"5.005_52","date":"1998-09-25T11:59:38"},{"date":"1998-10-09T17:05:49","version":"5.004_05"},{"version":"5.005_53","date":"1998-10-31T12:32:20"},{"date":"1998-11-22T23:06:16","version":"5.004_05"},{"date":"1998-11-30T03:26:39","version":"5.005_03"},{"version":"5.005_54","date":"1998-11-30T04:29:11"},{"date":"1998-12-03T17:22:19","version":"5.004_05"},{"date":"1999-01-03T20:44:49","version":"5.005_03"},{"date":"1999-01-17T18:28:14","version":"5.005_03"},{"version":"5.005_03","date":"1999-01-26T04:39:36"},{"version":"5.005_03","date":"1999-01-29T05:03:44"},{"date":"1999-02-16T07:11:42","version":"5.005_55"},{"version":"5.005_56","date":"1999-03-01T05:38:00"},{"version":"5.005_03","date":"1999-03-05T02:22:53"},{"date":"1999-03-29T00:50:43","version":"5.005_03"},{"date":"1999-04-27T00:23:40","version":"5.004_05"},{"date":"1999-04-29T20:04:24","version":"5.004_05"},{"date":"1999-05-25T10:36:40","version":"5.005_57"},{"version":"5.005_58","date":"1999-07-27T11:00:38"},{"version":"5.005_59","date":"1999-08-02T08:52:25"},{"version":"5.005_60","date":"1999-08-02T21:13:44"},{"version":"5.005_61","date":"1999-08-22T20:40:16"},{"version":"5.005_62","date":"1999-10-15T10:36:17"},{"date":"1999-12-09T11:38:49","version":"5.005_63"},{"version":"v5.5.640","date":"2000-02-02T13:06:00"},{"date":"2000-02-08T08:37:47","version":"v5.5.650"},{"date":"2000-02-22T11:41:34","version":"v5.5.660"},{"version":"v5.5.670","date":"2000-03-01T07:34:59"},{"date":"2000-03-23T06:06:13","version":"v5.6.0"},{"version":"v5.7.0","date":"2000-09-02T18:07:32"},{"version":"v5.6.1","date":"2000-12-18T10:12:29"},{"version":"v5.6.1","date":"2001-01-31T16:18:51"},{"version":"v5.6.1","date":"2001-03-19T09:36:57"},{"date":"2001-04-09T04:47:17","version":"v5.6.1"},{"date":"2001-04-10T02:54:00","version":"v5.7.1"},{"version":"v5.7.2","date":"2001-07-13T14:50:55"},{"date":"2002-03-05T05:00:31","version":"v5.7.3"},{"version":"v5.8.0","date":"2002-06-01T19:09:00"},{"version":"v5.8.0","date":"2002-06-21T14:56:35"},{"date":"2002-07-14T00:26:18","version":"v5.8.0"},{"date":"2002-07-18T23:32:56","version":"v5.8.0"},{"date":"2003-07-10T06:52:39","version":"v5.8.1"},{"date":"2003-07-11T12:23:20","version":"v5.8.1"},{"date":"2003-07-30T20:28:59","version":"v5.8.1"},{"version":"v5.8.1","date":"2003-08-01T15:49:36"},{"date":"2003-09-22T09:14:19","version":"v5.8.1"},{"date":"2003-09-25T11:49:06","version":"v5.8.1"},{"version":"5.009","date":"2003-10-27T02:59:51"},{"date":"2003-10-27T23:40:16","version":"5.008001"},{"version":"5.008001","date":"2003-11-03T09:03:41"},{"date":"2003-11-05T23:34:05","version":"5.008001"},{"date":"2003-11-08T15:53:25","version":"v5.6.2"},{"version":"v5.6.2","date":"2003-11-15T12:53:43"},{"date":"2003-12-05T16:42:45","version":"5.005_03"},{"date":"2004-01-07T14:40:01","version":"5.008001"},{"date":"2004-01-14T19:03:21","version":"5.008003"},{"version":"5.005_03","date":"2004-01-20T21:48:04"},{"date":"2004-01-27T21:18:43","version":"5.005_03"},{"version":"5.005_04","date":"2004-02-04T22:55:06"},{"version":"5.005","date":"2004-02-18T14:20:15"},{"version":"5.005","date":"2004-02-23T14:02:10"},{"version":"5.009001","date":"2004-03-16T19:35:25"},{"version":"5.008003","date":"2004-04-05T21:27:48"},{"version":"5.008003","date":"2004-04-15T22:59:51"},{"date":"2004-04-21T23:03:10","version":"5.008003"},{"version":"5.008005","date":"2004-07-06T21:41:21"},{"version":"5.008005","date":"2004-07-08T21:55:05"},{"version":"5.008005","date":"2004-07-19T21:56:20"},{"date":"2004-11-11T19:56:33","version":"5.008006"},{"version":"5.008006","date":"2004-11-27T23:56:17"},{"version":"5.009002","date":"2005-04-01T09:53:24"},{"version":"5.008007","date":"2005-05-18T16:35:37"},{"version":"5.008007","date":"2005-05-30T22:19:23"},{"version":"5.008008","date":"2006-01-20T10:09:18"},{"version":"5.009003","date":"2006-01-28T11:11:38"},{"date":"2006-02-01T00:00:59","version":"5.008008"},{"version":"5.009004","date":"2006-08-15T13:48:30"},{"version":"5.009005","date":"2007-07-07T16:13:57"},{"version":"5.009005","date":"2007-11-17T15:31:20"},{"version":"5.010000","date":"2007-11-25T18:22:18"},{"date":"2007-12-18T17:41:41","version":"5.010000"},{"version":"5.008009","date":"2008-11-10T23:14:59"},{"version":"5.008009","date":"2008-12-06T22:50:35"},{"date":"2008-12-14T23:08:28","version":"5.008009"},{"version":"5.010001","date":"2009-08-06T16:11:03"},{"version":"5.010001","date":"2009-08-18T23:45:03"},{"date":"2009-08-23T14:21:38","version":"5.010001"},{"date":"2009-10-02T20:51:46","version":"5.011000"},{"date":"2009-10-20T17:51:38","version":"5.011001"},{"date":"2009-11-20T07:20:52","version":"5.011002"},{"date":"2009-12-21T04:49:14","version":"5.011003"},{"version":"5.011004","date":"2010-01-20T16:48:28"},{"date":"2010-02-21T00:45:26","version":"5.011005"},{"version":"5.012000","date":"2010-03-21T20:41:11"},{"date":"2010-03-29T18:29:49","version":"5.012000"},{"date":"2010-04-01T02:38:12","version":"5.012000"},{"date":"2010-04-03T02:40:48","version":"5.012000"},{"version":"5.012000","date":"2010-04-07T05:39:46"},{"version":"5.012000","date":"2010-04-10T03:46:04"},{"date":"2010-04-12T22:38:37","version":"5.012000"},{"version":"5.013000","date":"2010-04-20T20:06:02"},{"version":"5.012001","date":"2010-05-10T02:43:48"},{"date":"2010-05-13T22:31:41","version":"5.012001"},{"version":"5.012001","date":"2010-05-16T22:40:16"},{"version":"5.013001","date":"2010-05-20T14:03:45"},{"version":"5.013002","date":"2010-06-22T21:39:26"},{"date":"2010-07-20T10:23:23","version":"5.013003"},{"version":"5.013004","date":"2010-08-20T15:39:07"},{"version":"5.012002","date":"2010-08-31T16:48:01"},{"date":"2010-09-07T01:41:31","version":"5.012002"},{"date":"2010-09-19T21:22:47","version":"5.013005"},{"version":"5.013006","date":"2010-10-21T01:41:01"},{"date":"2010-11-21T01:14:06","version":"5.013007"},{"date":"2010-12-19T23:06:25","version":"5.013008"},{"date":"2011-01-10T02:12:53","version":"5.012003"},{"date":"2011-01-15T04:05:30","version":"5.012003"},{"date":"2011-01-18T02:13:17","version":"5.012003"},{"version":"5.013009","date":"2011-01-21T01:42:07"},{"date":"2011-01-22T03:35:35","version":"5.012003"},{"date":"2011-02-20T19:18:02","version":"5.013010"},{"version":"5.013011","date":"2011-03-20T19:49:16"},{"date":"2011-04-20T11:53:32","version":"5.014000"},{"date":"2011-05-04T16:42:27","version":"5.014000"},{"version":"5.014000","date":"2011-05-11T15:49:42"},{"date":"2011-05-14T20:34:05","version":"5.014000"},{"version":"5.012004","date":"2011-06-08T13:19:36"},{"version":"5.014001","date":"2011-06-09T23:48:04"},{"date":"2011-06-15T17:00:36","version":"5.012004"},{"version":"5.014001","date":"2011-06-17T02:42:01"},{"date":"2011-06-20T10:41:26","version":"5.012004"},{"date":"2011-06-20T23:19:05","version":"5.015000"},{"version":"5.015001","date":"2011-07-20T21:15:08"},{"date":"2011-08-21T00:05:23","version":"5.015002"},{"version":"5.014002","date":"2011-09-19T11:25:31"},{"date":"2011-09-21T03:05:05","version":"5.015003"},{"date":"2011-09-26T14:56:49","version":"5.014002"},{"date":"2011-10-20T21:17:45","version":"5.015004"},{"version":"5.015005","date":"2011-11-20T20:40:34"},{"version":"5.015006","date":"2011-12-20T17:55:58"},{"version":"5.015007","date":"2012-01-20T20:08:28"},{"version":"5.015008","date":"2012-02-20T22:38:13"},{"version":"5.015009","date":"2012-03-20T19:01:29"},{"date":"2012-05-11T03:41:02","version":"5.016000"},{"version":"5.016000","date":"2012-05-15T02:51:48"},{"date":"2012-05-16T03:22:59","version":"5.016000"},{"date":"2012-05-20T22:51:12","version":"5.016000"},{"date":"2012-05-26T16:24:02","version":"5.017000"},{"date":"2012-06-20T17:38:46","version":"5.017001"},{"version":"5.017002","date":"2012-07-20T14:27:59"},{"date":"2012-08-03T18:59:23","version":"5.016001"},{"date":"2012-08-08T22:30:11","version":"5.016001"},{"version":"5.017003","date":"2012-08-20T14:12:28"},{"version":"5.017004","date":"2012-09-20T00:40:48"},{"version":"5.014003","date":"2012-09-26T22:15:57"},{"version":"5.014003","date":"2012-10-10T19:46:29"},{"date":"2012-10-12T20:24:43","version":"5.014003"},{"date":"2012-10-20T16:31:11","version":"5.017005"},{"version":"5.016002","date":"2012-10-27T01:23:09"},{"date":"2012-11-01T13:44:07","version":"5.016002"},{"version":"5.012005","date":"2012-11-03T17:27:59"},{"date":"2012-11-08T21:12:17","version":"5.012005"},{"version":"5.012005","date":"2012-11-10T14:02:17"},{"version":"5.017006","date":"2012-11-21T00:08:12"},{"date":"2012-12-18T21:50:28","version":"5.017007"},{"version":"5.017008","date":"2013-01-20T18:48:45"},{"date":"2013-02-20T22:21:02","version":"5.017009"},{"version":"5.014004","date":"2013-03-05T17:03:49"},{"version":"5.016003","date":"2013-03-07T16:03:14"},{"date":"2013-03-07T19:52:52","version":"5.014004"},{"version":"5.014004","date":"2013-03-10T23:47:40"},{"date":"2013-03-11T21:08:33","version":"5.016003"},{"date":"2013-03-21T23:11:03","version":"5.017010"},{"date":"2013-04-21T00:52:16","version":"5.017011"},{"date":"2013-05-11T12:29:53","version":"5.018000"},{"date":"2013-05-12T23:14:51","version":"5.018000"},{"date":"2013-05-14T01:32:05","version":"5.018000"},{"date":"2013-05-16T02:53:44","version":"5.018000"},{"version":"5.018000","date":"2013-05-18T13:33:49"},{"version":"5.019000","date":"2013-05-20T13:12:38"},{"date":"2013-06-21T01:24:18","version":"5.019001"},{"version":"5.019002","date":"2013-07-22T05:59:35"},{"date":"2013-08-02T03:09:02","version":"5.018001"},{"date":"2013-08-04T12:34:33","version":"5.018001"},{"date":"2013-08-09T02:28:00","version":"5.018001"},{"version":"5.018001","date":"2013-08-12T14:31:08"},{"version":"5.019003","date":"2013-08-20T16:09:42"},{"date":"2013-09-20T15:58:20","version":"5.019004"},{"version":"5.019005","date":"2013-10-20T13:25:55"},{"version":"5.019006","date":"2013-11-20T20:37:20"},{"version":"5.018002","date":"2013-12-02T22:36:49"},{"date":"2013-12-07T13:55:43","version":"5.018002"},{"date":"2013-12-19T21:27:42","version":"5.018002"},{"version":"5.019007","date":"2013-12-20T20:55:37"},{"version":"5.018002","date":"2013-12-22T03:30:43"},{"version":"5.018002","date":"2014-01-07T01:52:57"},{"date":"2014-01-20T21:59:04","version":"5.019008"},{"version":"5.019009","date":"2014-02-20T04:24:45"},{"version":"5.019010","date":"2014-03-20T20:40:26"},{"version":"5.019011","date":"2014-04-20T15:47:12"},{"date":"2014-05-17T00:16:49","version":"5.020000"},{"date":"2014-05-27T01:35:13","version":"5.020000"},{"date":"2014-05-27T14:32:18","version":"5.021000"},{"date":"2014-06-20T15:31:10","version":"5.021001"},{"date":"2014-07-20T13:48:02","version":"5.021002"},{"date":"2014-08-21T02:26:13","version":"5.021003"},{"date":"2014-08-25T18:10:32","version":"5.020001"},{"version":"5.020001","date":"2014-09-07T17:01:11"},{"date":"2014-09-14T13:11:14","version":"5.020001"},{"date":"2014-09-17T20:29:53","version":"5.018003"},{"version":"5.021004","date":"2014-09-20T13:33:14"},{"date":"2014-09-27T12:54:08","version":"5.018003"},{"version":"5.018003","date":"2014-10-01T13:22:50"},{"date":"2014-10-02T00:48:31","version":"5.018004"},{"version":"5.021005","date":"2014-10-20T16:54:20"},{"version":"5.021006","date":"2014-11-20T23:39:06"},{"version":"5.021007","date":"2014-12-20T17:34:57"},{"version":"5.021008","date":"2015-01-20T20:20:05"},{"date":"2015-02-01T03:07:56","version":"5.020002"},{"date":"2015-02-14T18:26:43","version":"5.020002"},{"version":"5.021009","date":"2015-02-21T05:27:09"},{"date":"2015-03-20T18:30:20","version":"5.021010"},{"date":"2015-04-20T21:28:37","version":"5.021011"},{"date":"2015-05-19T14:12:19","version":"5.022000"},{"version":"5.022000","date":"2015-05-21T23:03:22"},{"version":"5.022000","date":"2015-06-01T17:51:59"},{"date":"2015-06-20T20:22:32","version":"5.023000"},{"date":"2015-07-20T19:26:31","version":"5.023001"},{"date":"2015-08-20T15:36:45","version":"5.023002"},{"date":"2015-08-22T22:12:34","version":"5.020003"},{"date":"2015-08-29T22:02:43","version":"5.020003"},{"version":"5.020003","date":"2015-09-12T19:09:14"},{"version":"5.023003","date":"2015-09-21T02:47:16"},{"version":"5.023004","date":"2015-10-20T22:17:48"},{"version":"5.022001","date":"2015-10-31T18:42:58"},{"version":"5.022001","date":"2015-11-15T15:15:03"},{"version":"5.023005","date":"2015-11-20T17:09:38"},{"date":"2015-12-02T22:07:35","version":"5.022001"},{"version":"5.022001","date":"2015-12-08T21:34:05"},{"version":"5.022001","date":"2015-12-13T19:48:31"},{"date":"2015-12-21T22:40:27","version":"5.023006"},{"date":"2016-01-20T21:52:22","version":"5.023007"},{"version":"5.023008","date":"2016-02-20T21:56:31"},{"version":"5.023009","date":"2016-03-20T16:45:40"},{"date":"2016-04-10T17:29:04","version":"5.022002"},{"version":"5.024000","date":"2016-04-14T03:27:48"},{"date":"2016-04-23T20:56:14","version":"5.024000"},{"date":"2016-04-27T01:02:55","version":"5.024000"},{"version":"5.022002","date":"2016-04-29T21:39:25"},{"version":"5.024000","date":"2016-05-02T14:41:03"},{"date":"2016-05-04T22:27:57","version":"5.024000"},{"date":"2016-05-09T11:35:29","version":"5.024000"},{"date":"2016-05-09T12:02:53","version":"5.025000"},{"version":"5.025001","date":"2016-05-20T21:33:43"},{"version":"5.025002","date":"2016-06-20T21:02:44"},{"date":"2016-07-17T22:27:32","version":"5.022003"},{"version":"5.024001","date":"2016-07-17T22:29:08"},{"date":"2016-07-20T16:22:41","version":"5.025003"},{"date":"2016-07-25T12:58:33","version":"5.022003"},{"version":"5.024001","date":"2016-07-25T13:01:21"},{"date":"2016-08-11T23:47:40","version":"5.022003"},{"date":"2016-08-11T23:50:29","version":"5.024001"},{"date":"2016-08-20T20:25:19","version":"5.025004"},{"date":"2016-09-20T17:45:06","version":"5.025005"},{"version":"5.022003","date":"2016-10-12T21:39:57"},{"version":"5.024001","date":"2016-10-12T21:40:57"},{"date":"2016-10-20T15:44:55","version":"5.025006"},{"version":"5.025007","date":"2016-11-20T21:20:07"},{"version":"5.025008","date":"2016-12-20T19:14:33"},{"date":"2017-01-02T18:54:51","version":"5.022003"},{"version":"5.024001","date":"2017-01-02T18:57:38"},{"version":"5.022003","date":"2017-01-14T20:04:05"},{"version":"5.024001","date":"2017-01-14T20:04:30"},{"date":"2017-01-20T15:25:43","version":"5.025009"},{"date":"2017-02-20T21:21:01","version":"5.025010"},{"date":"2017-03-20T20:56:49","version":"5.025011"},{"date":"2017-04-20T19:32:05","version":"5.025012"},{"date":"2017-05-11T17:07:17","version":"5.026000"},{"date":"2017-05-23T23:19:34","version":"5.026000"},{"version":"5.026000","date":"2017-05-30T19:42:51"},{"date":"2017-05-31T21:11:57","version":"5.027000"},{"version":"5.027001","date":"2017-06-20T06:39:54"},{"date":"2017-07-01T21:50:24","version":"5.022004"},{"version":"5.024002","date":"2017-07-01T21:50:55"},{"version":"5.022004","date":"2017-07-15T17:26:52"},{"date":"2017-07-15T17:29:00","version":"5.024002"},{"version":"5.027002","date":"2017-07-20T19:28:36"},{"version":"5.027003","date":"2017-08-21T20:43:51"},{"version":"5.024003","date":"2017-09-10T15:37:08"},{"date":"2017-09-10T15:38:22","version":"5.026001"},{"version":"5.027004","date":"2017-09-20T21:44:22"},{"version":"5.024003","date":"2017-09-22T21:29:50"},{"version":"5.026001","date":"2017-09-22T21:30:56"},{"version":"5.027005","date":"2017-10-20T22:08:15"},{"date":"2017-11-20T22:39:31","version":"5.027006"},{"version":"5.027007","date":"2017-12-20T22:58:25"},{"date":"2018-01-20T03:17:50","version":"5.027008"},{"date":"2018-02-20T20:46:45","version":"5.027009"},{"version":"5.027010","date":"2018-03-20T21:08:53"},{"date":"2018-03-24T19:33:50","version":"5.024004"},{"date":"2018-03-24T19:37:40","version":"5.026002"},{"date":"2018-04-14T11:25:22","version":"5.024004"},{"date":"2018-04-14T11:27:18","version":"5.026002"},{"date":"2018-04-20T15:10:52","version":"5.027011"},{"date":"2018-05-21T13:12:00","version":"5.028000"},{"version":"5.028000","date":"2018-06-06T12:34:00"},{"date":"2018-06-18T22:47:34","version":"5.028000"},{"date":"2018-06-19T20:45:05","version":"5.028000"},{"date":"2018-06-23T02:05:28","version":"5.028000"},{"date":"2018-06-26T21:25:53","version":"5.029000"},{"version":"5.029001","date":"2018-07-20T15:13:07"},{"version":"5.029002","date":"2018-08-20T21:04:27"},{"date":"2018-09-21T02:58:51","version":"5.029003"},{"version":"5.029004","date":"2018-10-20T14:20:56"},{"version":"5.029005","date":"2018-11-20T22:03:07"},{"date":"2018-11-29T19:03:17","version":"5.026003"},{"date":"2018-11-29T19:03:28","version":"5.028001"},{"date":"2018-11-30T22:02:29","version":"5.026003"},{"version":"5.028001","date":"2018-11-30T22:03:06"},{"date":"2018-12-18T12:26:18","version":"5.029006"},{"version":"5.029007","date":"2019-01-20T02:16:52"},{"date":"2019-02-21T05:30:00","version":"5.029008"},{"version":"5.029009","date":"2019-03-21T11:49:45"},{"date":"2019-04-05T19:46:23","version":"5.028002"},{"date":"2019-04-19T15:07:44","version":"5.028002"},{"version":"5.029010","date":"2019-04-20T18:11:45"},{"date":"2019-05-11T22:58:31","version":"5.030000"},{"date":"2019-05-17T20:44:42","version":"5.030000"},{"date":"2019-05-22T09:35:50","version":"5.030000"},{"version":"5.031000","date":"2019-05-24T19:28:47"},{"version":"5.031001","date":"2019-06-20T20:19:01"},{"version":"5.031002","date":"2019-07-20T17:01:20"},{"version":"5.031003","date":"2019-08-20T14:02:01"},{"version":"5.031004","date":"2019-09-20T21:27:31"},{"date":"2019-10-20T14:29:11","version":"5.031005"},{"date":"2019-10-27T16:29:27","version":"5.030001"},{"date":"2019-11-10T14:14:00","version":"5.030001"},{"version":"5.031006","date":"2019-11-20T22:14:49"},{"date":"2019-12-21T03:38:57","version":"5.031007"},{"date":"2020-01-20T17:17:53","version":"5.031008"},{"version":"5.031009","date":"2020-02-20T23:03:22"},{"version":"5.030002","date":"2020-02-29T19:25:07"},{"version":"5.030002","date":"2020-03-14T17:04:56"},{"version":"5.031010","date":"2020-03-20T20:08:58"},{"version":"5.031011","date":"2020-04-28T19:49:59"},{"version":"5.032000","date":"2020-05-30T18:47:47"},{"version":"5.028003","date":"2020-06-01T19:17:48"},{"version":"5.028003","date":"2020-06-01T19:19:30"},{"version":"5.030003","date":"2020-06-01T19:19:54"},{"date":"2020-06-01T19:21:31","version":"5.030003"},{"version":"5.032000","date":"2020-06-07T21:13:05"},{"date":"2020-06-20T20:38:54","version":"5.032000"},{"version":"5.033000","date":"2020-07-17T19:38:54"},{"date":"2020-08-20T20:36:01","version":"5.033001"},{"date":"2020-09-20T16:29:59","version":"5.033002"},{"version":"5.033003","date":"2020-10-20T21:30:28"},{"version":"5.033004","date":"2020-11-20T13:32:10"},{"date":"2020-12-20T14:00:43","version":"5.033005"},{"version":"5.032001","date":"2021-01-09T16:48:26"},{"date":"2021-01-21T01:34:41","version":"5.033006"},{"date":"2021-01-23T14:56:24","version":"5.032001"},{"date":"2021-02-20T09:58:24","version":"5.033007"},{"version":"5.033008","date":"2021-03-21T00:55:24"},{"date":"2021-04-20T23:37:29","version":"5.033009"},{"date":"2021-05-04T23:24:07","version":"5.034000"},{"date":"2021-05-15T14:56:00","version":"5.034000"},{"date":"2021-05-20T20:07:59","version":"5.034000"},{"version":"5.035000","date":"2021-05-21T02:06:41"},{"version":"5.035001","date":"2021-06-20T12:39:44"},{"date":"2021-07-23T12:53:17","version":"5.035002"},{"version":"5.035003","date":"2021-08-21T03:17:40"},{"date":"2021-09-20T19:46:41","version":"5.035004"},{"version":"5.035005","date":"2021-10-21T19:32:21"},{"version":"5.035006","date":"2021-11-21T00:22:09"},{"date":"2021-12-20T23:35:42","version":"5.035007"},{"date":"2022-01-20T22:39:08","version":"5.035008"},{"date":"2022-02-20T12:32:59","version":"5.035009"},{"version":"5.034001","date":"2022-02-27T14:18:13"},{"date":"2022-03-06T17:23:15","version":"5.034001"},{"version":"5.034001","date":"2022-03-13T08:40:18"},{"version":"5.035010","date":"2022-03-20T18:33:42"},{"version":"5.035011","date":"2022-04-20T20:33:20"},{"version":"5.036000","date":"2022-05-21T00:12:21"},{"date":"2022-05-22T19:36:07","version":"5.036000"},{"version":"5.036000","date":"2022-05-28T00:26:10"},{"date":"2022-05-28T02:33:40","version":"5.037000"},{"date":"2022-06-20T18:57:04","version":"5.037001"},{"date":"2022-07-21T01:37:24","version":"5.037002"},{"date":"2022-08-20T18:57:47","version":"5.037003"},{"date":"2022-09-21T00:25:19","version":"5.037004"},{"version":"5.037005","date":"2022-10-20T17:33:58"},{"date":"2022-11-20T11:56:16","version":"5.037006"},{"version":"5.037007","date":"2022-12-20T17:14:30"},{"version":"5.037008","date":"2023-01-20T15:20:59"},{"version":"5.037009","date":"2023-02-20T20:45:20"},{"date":"2023-03-21T08:16:37","version":"5.037010"},{"date":"2023-04-10T20:07:53","version":"5.036001"},{"date":"2023-04-11T19:50:09","version":"5.036001"},{"version":"5.036001","date":"2023-04-16T15:35:15"},{"date":"2023-04-20T19:05:36","version":"5.037011"},{"date":"2023-04-23T15:22:26","version":"5.036001"},{"date":"2023-06-16T02:09:05","version":"5.038000"},{"date":"2023-06-23T21:17:27","version":"5.038000"},{"version":"5.038000","date":"2023-07-02T23:00:28"},{"version":"5.039001","date":"2023-07-20T19:09:13"},{"version":"5.039002","date":"2023-08-20T22:46:17"},{"date":"2023-09-20T16:12:58","version":"5.039003"},{"version":"5.039004","date":"2023-10-25T19:15:57"},{"date":"2023-11-20T02:49:43","version":"5.039005"},{"version":"5.034002","date":"2023-11-25T15:19:49"},{"version":"5.036002","date":"2023-11-25T15:20:11"},{"date":"2023-11-25T15:21:49","version":"5.038001"},{"date":"2023-11-25T15:58:49","version":"5.034002"},{"version":"5.036002","date":"2023-11-25T15:59:01"},{"date":"2023-11-25T15:59:13","version":"5.038001"},{"date":"2023-11-29T13:10:30","version":"5.034003"},{"version":"5.036003","date":"2023-11-29T16:08:59"},{"date":"2023-11-29T16:10:36","version":"5.038002"},{"date":"2023-12-30T21:59:20","version":"5.039006"},{"date":"2024-01-20T12:44:12","version":"5.039007"},{"version":"5.039008","date":"2024-02-23T14:25:56"},{"version":"5.039009","date":"2024-03-20T16:26:28"},{"version":"5.039010","date":"2024-04-27T19:22:49"},{"version":"5.040000","date":"2024-05-24T20:45:21"},{"date":"2024-06-04T21:47:57","version":"5.040000"},{"version":"5.040000","date":"2024-06-09T20:45:37"},{"date":"2024-07-02T14:28:09","version":"5.041001"},{"version":"5.041002","date":"2024-07-20T20:54:48"},{"date":"2024-08-29T13:23:40","version":"5.041003"},{"version":"5.041004","date":"2024-09-20T11:18:14"},{"date":"2024-10-20T20:49:26","version":"5.041005"},{"version":"5.041006","date":"2024-11-20T08:29:25"},{"date":"2024-12-20T14:31:24","version":"5.041007"},{"date":"2025-01-05T20:28:54","version":"5.038003"},{"date":"2025-01-05T20:32:07","version":"5.040001"},{"date":"2025-01-18T19:43:21","version":"5.038003"},{"version":"5.040001","date":"2025-01-18T19:48:20"},{"version":"5.041008","date":"2025-01-20T21:30:07"},{"date":"2025-02-24T08:19:26","version":"5.041009"},{"date":"2025-03-21T12:49:33","version":"5.041010"},{"date":"2025-04-13T13:05:54","version":"5.038004"},{"version":"5.038004","date":"2025-04-13T13:06:16"},{"date":"2025-04-13T13:06:38","version":"5.040002"},{"date":"2025-04-13T13:07:01","version":"5.040002"},{"version":"5.041011","date":"2025-04-21T01:51:01"},{"date":"2025-04-21T22:49:29","version":"5.041012"}]},"Net-Ping-External":{"advisories":[{"references":["https://rt.cpan.org/Public/Bug/Display.html?id=33230","https://bugs.debian.org/881097","http://www.openwall.com/lists/oss-security/2017/11/07/4","http://matthias.sdfeu.org/devel/net-ping-external-cmd-injection.patch"],"affected_versions":["<=0.15"],"severity":"critical","description":"The Net::Ping::External extension through 0.15 for Perl does not properly sanitize arguments (e.g., invalid hostnames) containing shell metacharacters before use of backticks in External.pm, allowing for shell command injection and arbitrary command execution if untrusted input is used.\n","distribution":"Net-Ping-External","fixed_versions":[],"reported":"2017-11-07","cves":["CVE-2008-7319"],"id":"CPANSA-Net-Ping-External-2008-7319"}],"main_module":"Net::Ping::External","versions":[{"date":"2001-03-15T21:53:04","version":"0.01"},{"date":"2001-03-22T00:15:08","version":"0.02"},{"version":"0.03","date":"2001-03-23T08:35:49"},{"date":"2001-04-20T17:33:31","version":"0.04"},{"version":"0.05","date":"2001-04-20T18:43:34"},{"version":"0.06","date":"2001-04-26T02:59:41"},{"version":"0.07","date":"2001-09-28T02:20:34"},{"version":"0.08","date":"2001-09-30T21:39:47"},{"version":"0.09","date":"2001-11-10T06:10:33"},{"date":"2001-11-10T16:19:21","version":"0.10"},{"version":"0.11","date":"2003-02-11T22:41:33"},{"version":"0.12_01","date":"2006-09-07T10:52:21"},{"date":"2007-01-31T22:09:41","version":"0.12_02"},{"version":"0.12","date":"2007-02-08T16:06:46"},{"version":"0.13","date":"2008-12-18T20:27:07"},{"date":"2013-10-29T17:05:01","version":"0.14"},{"date":"2014-04-12T21:37:12","version":"0.15"}]},"Config-IniFiles":{"advisories":[{"affected_versions":["<2.71"],"references":["http://www.openwall.com/lists/oss-security/2012/05/02/6","http://www.osvdb.org/81671","http://secunia.com/advisories/48990","https://bitbucket.org/shlomif/perl-config-inifiles/changeset/a08fa26f4f59","https://bugzilla.redhat.com/show_bug.cgi?id=818386","http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080713.html","http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080716.html","http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081207.html","http://www.securityfocus.com/bid/53361","http://www.ubuntu.com/usn/USN-1543-1","https://exchange.xforce.ibmcloud.com/vulnerabilities/75328"],"severity":null,"cves":["CVE-2012-2451"],"reported":"2012-06-27","fixed_versions":[],"description":"The Config::IniFiles module before 2.71 for Perl creates temporary files with predictable names, which allows local users to overwrite arbitrary files via a symlink attack. NOTE: some of these details are obtained from third party information. NOTE: it has been reported that this might only be exploitable by writing in the same directory as the .ini file. If this is the case, then this issue might not cross privilege boundaries.\n","distribution":"Config-IniFiles","id":"CPANSA-Config-IniFiles-2012-2451"}],"main_module":"Config::IniFiles","versions":[{"date":"2000-06-20T02:07:11","version":"0.05"},{"date":"2000-06-26T02:38:13","version":"0.06"},{"version":"0.08","date":"2000-07-31T01:32:53"},{"version":"0.09","date":"2000-07-31T01:51:15"},{"date":"2000-09-17T03:29:50","version":"0.11"},{"date":"2000-09-20T01:06:10","version":"1.6"},{"date":"2000-10-17T02:01:37","version":"1.8"},{"version":"1.11","date":"2000-11-25T03:36:14"},{"date":"2000-11-28T14:09:00","version":"1.12"},{"date":"2000-11-28T14:09:15","version":"1.13"},{"date":"2000-12-13T17:45:25","version":"2.10"},{"date":"2000-12-18T17:56:28","version":"2.13"},{"version":"2.14","date":"2001-01-08T18:27:24"},{"version":"2.17","date":"2001-03-24T21:54:18"},{"version":"2.18","date":"2001-03-30T04:48:27"},{"date":"2001-04-05T01:06:51","version":"2.19"},{"version":"2.21","date":"2001-08-28T11:05:35"},{"version":"2.22","date":"2001-12-06T17:15:03"},{"date":"2001-12-07T16:24:14","version":"2.23"},{"date":"2001-12-07T17:27:08","version":"2.24"},{"version":"2.25","date":"2001-12-12T20:50:06"},{"version":"2.26","date":"2001-12-19T22:26:32"},{"version":"2.27","date":"2001-12-20T16:11:24"},{"date":"2002-08-15T21:41:35","version":"2.29"},{"version":"2.30","date":"2002-10-15T18:59:21"},{"date":"2002-12-18T01:58:55","version":"2.36"},{"version":"2.37","date":"2003-01-31T23:06:08"},{"version":"2.38","date":"2003-05-14T01:38:13"},{"date":"2005-04-29T20:33:23","version":"2.39"},{"version":"2.43","date":"2008-12-04T17:02:19"},{"version":"2.44","date":"2008-12-25T09:47:08"},{"version":"2.45","date":"2008-12-27T15:25:59"},{"version":"2.46","date":"2009-01-17T14:40:26"},{"date":"2009-01-21T09:41:11","version":"2.47"},{"version":"2.48","date":"2009-04-07T12:26:44"},{"version":"2.49","date":"2009-05-02T14:27:53"},{"version":"2.50","date":"2009-05-31T11:58:04"},{"version":"2.51","date":"2009-06-08T09:41:11"},{"date":"2009-06-28T13:21:57","version":"2.52"},{"date":"2009-11-13T09:58:28","version":"2.53"},{"date":"2009-11-18T11:15:13","version":"2.54"},{"date":"2009-12-22T15:48:07","version":"2.55"},{"version":"2.56","date":"2009-12-31T04:57:40"},{"version":"2.57","date":"2010-03-01T13:51:57"},{"date":"2010-05-17T07:45:33","version":"2.58"},{"date":"2010-11-12T11:33:52","version":"2.59"},{"version":"2.60","date":"2010-11-13T07:22:50"},{"version":"2.61","date":"2010-11-14T08:57:26"},{"date":"2010-11-19T13:37:37","version":"2.62"},{"version":"2.63","date":"2010-11-19T14:54:12"},{"version":"2.64","date":"2010-11-20T09:55:05"},{"date":"2010-11-25T18:48:52","version":"2.65"},{"date":"2011-01-29T16:40:18","version":"2.66"},{"date":"2011-06-21T11:59:37","version":"2.67"},{"date":"2011-06-21T19:18:33","version":"2.68"},{"date":"2012-04-05T09:10:11","version":"2.69"},{"date":"2012-04-06T09:52:14","version":"2.70"},{"date":"2012-05-02T08:05:15","version":"2.71"},{"date":"2012-05-05T16:56:55","version":"2.72"},{"date":"2012-05-14T07:49:33","version":"2.73"},{"version":"2.74","date":"2012-05-23T21:47:46"},{"date":"2012-05-25T12:29:48","version":"2.75"},{"version":"2.76","date":"2012-06-15T14:47:10"},{"version":"2.77","date":"2012-06-21T16:39:23"},{"date":"2012-10-21T11:18:39","version":"2.78"},{"version":"2.79","date":"2013-05-06T07:10:33"},{"version":"2.80","date":"2013-05-14T19:25:07"},{"date":"2013-05-16T10:36:17","version":"2.81"},{"date":"2013-05-21T15:35:10","version":"2.82"},{"date":"2014-01-27T09:01:28","version":"2.83"},{"version":"2.84","date":"2015-04-13T18:40:30"},{"date":"2015-04-13T19:08:57","version":"2.85"},{"date":"2015-04-14T07:55:59","version":"2.86"},{"version":"2.87","date":"2015-06-16T09:06:37"},{"date":"2015-07-10T08:38:11","version":"2.88"},{"date":"2016-05-03T09:14:13","version":"2.89"},{"date":"2016-06-02T13:09:19","version":"2.90"},{"date":"2016-06-03T03:11:38","version":"2.91"},{"version":"2.92","date":"2016-06-17T09:34:08"},{"version":"2.93","date":"2016-07-24T08:34:00"},{"version":"2.94","date":"2016-11-29T17:31:38"},{"date":"2018-03-16T11:14:39","version":"2.95"},{"date":"2018-04-07T08:45:56","version":"2.96"},{"date":"2018-04-21T09:13:56","version":"2.97"},{"version":"2.98","date":"2018-04-21T11:50:34"},{"date":"2018-09-13T07:11:41","version":"3.000000"},{"version":"3.000001","date":"2019-01-16T09:54:40"},{"date":"2019-03-14T13:34:40","version":"3.000002"},{"date":"2020-03-24T15:45:08","version":"3.000003"}]},"CGI-Application-Plugin-CAPTCHA":{"main_module":"CGI::Application::Plugin::CAPTCHA","versions":[{"version":"0.01","date":"2005-08-28T18:31:21"},{"date":"2011-01-05T05:07:55","version":"0.02"},{"date":"2011-01-05T05:10:54","version":"0.03"},{"date":"2011-01-06T14:08:56","version":"0.04"}],"advisories":[{"affected_versions":["<0.02"],"references":["https://rt.cpan.org/Public/Bug/Display.html?id=30759","https://metacpan.org/release/CROMEDOME/CGI-Application-Plugin-CAPTCHA-0.02/changes","https://github.com/cromedome/cgi-application-plugin-captcha/commit/9acb5b6561a9983787ad85f55b01c69a895014e6"],"severity":null,"distribution":"CGI-Application-Plugin-CAPTCHA","description":"A malicious programmer creating an application to use the service can just have his application send along a cookie that he has created himself, and with that supply an appropriate verification string for his cookie. To avoid that you need to include som kind of hidden server-side password in the string being encrypted, and also include it when you verify.\n","reported":null,"fixed_versions":[">=0.02"],"cves":[],"id":"CPANSA-CGI-Application-Plugin-CAPTCHA-2024-001"}]},"BSON-XS":{"main_module":"BSON::XS","versions":[{"date":"2016-10-25T01:44:04","version":"v0.2.0"},{"version":"v0.2.1","date":"2016-10-27T14:29:08"},{"date":"2016-10-27T21:57:22","version":"v0.2.2"},{"date":"2018-05-17T20:38:16","version":"v0.4.0"},{"version":"v0.4.1","date":"2018-05-25T17:23:21"},{"date":"2018-06-13T14:02:45","version":"v0.4.2"},{"date":"2018-07-10T13:54:25","version":"v0.4.3"},{"date":"2018-09-13T03:31:32","version":"v0.4.4"},{"version":"v0.4.5","date":"2018-10-12T01:39:57"},{"version":"v0.4.6","date":"2018-10-12T15:51:36"},{"version":"v0.6.0","date":"2018-11-29T22:12:13"},{"version":"v0.8.0","date":"2019-07-12T18:08:23"},{"version":"v0.8.1","date":"2019-08-13T12:22:17"},{"date":"2019-12-05T18:59:17","version":"v0.8.2"},{"date":"2020-04-13T14:58:34","version":"v0.8.3"},{"date":"2020-08-13T14:54:04","version":"v0.8.4"}],"advisories":[{"reported":"2025-05-16","fixed_versions":[],"cves":["CVE-2025-40906","CVE-2017-14227","CVE-2018-16790","CVE-2023-0437","CVE-2024-6381","CVE-2024-6383","CVE-2025-0755"],"distribution":"BSON-XS","description":"BSON::XS versions 0.8.4 and earlier for Perl includes a bundled libbson 1.1.7, which has several vulnerabilities. Those include CVE-2017-14227, CVE-2018-16790, CVE-2023-0437, CVE-2024-6381, CVE-2024-6383, and CVE-2025-0755. BSON-XS was the official Perl XS implementation of MongoDB's BSON serialization, but this distribution has reached its end of life as of August 13, 2020 and is no longer supported.\n","id":"CPANSA-BSON-XS-2025-40906","affected_versions":["<=0.8.4"],"references":["https://lists.debian.org/debian-lts-announce/2025/05/msg00012.html","https://www.mongodb.com/community/forums/t/mongodb-perl-driver-end-of-life/7890"],"severity":"critical"}]},"GitLab-API-v4":{"advisories":[{"id":"CPANSA-GitLab-API-v4-2023-31485","cves":["CVE-2023-31485"],"reported":"2023-02-28","fixed_versions":[],"distribution":"GitLab-API-v4","description":"GitLab::API::v4 is missing the verify_SSL=>1 flag in HTTP::Tiny, allowing a network attacker to MITM connections to the GitLab server.\n","affected_versions":[">=0.26"],"references":["https://github.com/bluefeet/GitLab-API-v4/pull/57","https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/","https://www.openwall.com/lists/oss-security/2023/04/18/14","https://github.com/chansen/p5-http-tiny/pull/151"]}],"versions":[{"version":"0.01","date":"2017-12-11T18:40:52"},{"date":"2017-12-16T00:11:18","version":"0.02"},{"date":"2018-01-12T21:26:23","version":"0.03"},{"version":"0.04","date":"2018-02-03T23:15:40"},{"date":"2018-03-06T18:26:52","version":"0.05"},{"date":"2018-04-09T20:06:01","version":"0.06"},{"version":"0.07","date":"2018-05-10T21:33:05"},{"version":"0.08","date":"2018-05-14T17:33:39"},{"date":"2018-05-29T04:48:13","version":"0.09"},{"version":"0.10","date":"2018-06-06T06:47:41"},{"version":"0.11","date":"2018-09-02T05:24:51"},{"date":"2018-09-12T01:04:05","version":"0.12"},{"date":"2018-11-08T13:44:56","version":"0.13"},{"version":"0.14","date":"2018-12-04T20:39:42"},{"version":"0.15","date":"2019-01-09T18:13:46"},{"version":"0.16","date":"2019-02-18T06:21:38"},{"version":"0.17","date":"2019-02-20T22:49:13"},{"version":"0.18","date":"2019-04-01T04:36:27"},{"version":"0.19","date":"2019-05-17T20:41:31"},{"date":"2019-07-23T21:42:57","version":"0.20"},{"version":"0.21","date":"2019-08-24T18:56:25"},{"date":"2019-09-13T15:03:00","version":"0.22"},{"date":"2019-10-18T19:55:54","version":"0.23"},{"version":"0.24","date":"2020-02-12T22:10:58"},{"version":"0.25","date":"2020-02-12T22:21:40"},{"date":"2021-01-30T07:11:26","version":"0.26"},{"version":"0.27","date":"2023-06-07T20:51:14"}],"main_module":"GitLab::API::v4"},"Spoon":{"advisories":[{"severity":null,"affected_versions":[">0.24"],"references":["https://rt.cpan.org/Public/Bug/Display.html?id=85217","http://www.securityfocus.com/bid/59834","http://seclists.org/oss-sec/2013/q2/318","https://exchange.xforce.ibmcloud.com/vulnerabilities/84197"],"id":"CPANSA-Spoon-Cookie-2012-6143","description":"Spoon::Cookie in the Spoon module 0.24 for Perl does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via a crafted request, which is not properly handled when it is deserialized.\n","distribution":"Spoon","cves":["CVE-2012-6143"],"reported":"2014-06-04","fixed_versions":[]}],"versions":[{"date":"2004-03-21T10:04:10","version":"0.10"},{"date":"2004-03-23T07:50:48","version":"0.11"},{"version":"0.12","date":"2004-03-30T16:23:32"},{"version":"0.13","date":"2004-05-07T16:21:27"},{"date":"2004-06-02T10:15:14","version":"0.14"},{"date":"2004-06-21T17:39:05","version":"0.15"},{"date":"2004-06-22T17:43:16","version":"0.16"},{"version":"0.17","date":"2004-07-20T20:01:22"},{"version":"0.18","date":"2004-08-12T05:59:51"},{"date":"2004-12-16T00:12:10","version":"0.19"},{"date":"2004-12-18T09:04:38","version":"0.20"},{"version":"0.21","date":"2005-01-11T16:27:02"},{"date":"2005-04-04T14:49:45","version":"0.22"},{"version":"0.23","date":"2005-04-07T03:44:14"},{"version":"0.24","date":"2006-12-09T23:29:37"}],"main_module":"Spoon"},"CGI-Application-Plugin-RunmodeDeclare":{"main_module":"CGI::Application::Plugin::RunmodeDeclare","versions":[{"date":"2008-09-26T19:59:14","version":"0.01"},{"version":"0.02","date":"2008-09-26T21:37:11"},{"date":"2008-10-19T23:22:06","version":"0.03"},{"version":"0.03_01","date":"2008-10-23T14:18:23"},{"date":"2008-10-24T13:32:43","version":"0.03_02"},{"version":"0.03_03","date":"2008-10-24T16:20:27"},{"version":"0.04","date":"2008-10-25T10:54:25"},{"date":"2008-10-25T11:46:28","version":"0.05"},{"version":"0.06","date":"2008-10-25T16:39:34"},{"version":"0.07","date":"2009-01-10T02:32:39"},{"date":"2009-05-17T22:29:18","version":"0.08"},{"version":"0.09","date":"2010-01-07T13:24:09"},{"date":"2012-02-10T00:53:54","version":"0.10"}],"advisories":[{"references":["https://metacpan.org/changes/distribution/CGI-Application-Plugin-RunmodeDeclare"],"affected_versions":["<0.03"],"id":"CPANSA-CGI-Application-Plugin-RunmodeDeclare-2008-01","distribution":"CGI-Application-Plugin-RunmodeDeclare","description":"Wrong order of arguments.\n","fixed_versions":[">=0.03"],"reported":"2008-10-20","cves":[]}]},"Mojolicious":{"advisories":[{"references":["https://github.com/mojolicious/mojo/commit/6f195d85db6756022d3599f7d2634975688c9550","https://github.com/mojolicious/mojo/issues/2014","https://github.com/mojolicious/mojo/issues/2015"],"affected_versions":["<9.31"],"severity":null,"reported":"2022-12-10","cves":[],"fixed_versions":[">=9.31"],"description":"Mojo::DOM did not correctly parse