Browse all 5 CVE security advisories affecting RRWO. AI-powered Chinese analysis, POCs, and references for each vulnerability.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-45180 | Catalyst::Plugin::Statsd versions through 0.10.0 for Perl may leak session ids — Catalyst::Plugin::StatsdCWE-319 | 7.5AI | HighAI | 2026-05-10 |
| CVE-2026-45179 | Plack::Middleware::Statsd versions before 0.9.0 for Perl may leak user IP addresses — Plack::Middleware::StatsdCWE-319 | 5.3AI | MediumAI | 2026-05-10 |
| CVE-2026-7040 | Text::Minify::XS versions from 0.3.0 before 0.7.8 for Perl have heap overflow when processing some malformed UTF-8 characters — Text::Minify::XSCWE-176 | 9.8AI | CriticalAI | 2026-04-27 |
| CVE-2025-40911 | Net::CIDR::Set versions 0.10 through 0.13 for Perl does not properly consider leading zero characters in IP CIDR address strings, which could allow attackers to bypass access control that is based on IP addresses — Net::CIDR::SetCWE-1287 | 9.1AI | CriticalAI | 2025-05-27 |
| CVE-2025-3051 | Linux::Statm::Tiny for Perl allows untrusted code to be included from the current working directory — Linux::Statm::TinyCWE-427 | 8.8 | - | 2025-04-01 |
This page lists every published CVE security advisory associated with RRWO. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.