XML-Atom 0.37 Deleted
Security Advisories
CVE-2012-1102
It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used.
Severity: high
Reported: 2021-07-09
Kwalitee Issues
No Core Issues.
- has_meta_json
-
Add a META.json to the distribution. Your buildtool should be able to autogenerate it.
- use_warnings
-
Add 'use warnings' (or its equivalents) to all modules, or convince us that your favorite module is well-known enough and people can easily see the modules warn when something bad happens.
Error: XML::Atom, XML::Atom::Base, XML::Atom::Category, XML::Atom::Client, XML::Atom::Content, XML::Atom::Entry, XML::Atom::ErrorHandler, XML::Atom::Feed, XML::Atom::Link, XML::Atom::Person, XML::Atom::Server, XML::Atom::Thing, XML::Atom::Util
- meta_yml_has_provides
-
Add all modules contained in this distribution to the META.yml field 'provides'. Module::Build or Dist::Zilla::Plugin::MetaProvides do this automatically for you.
- has_separate_license_file
-
This is not a critical issue. Currently mainly informative for the CPANTS authors. It might be removed later.
Modules
Name | Abstract | Version | View |
---|---|---|---|
XML::Atom | Atom feed and API implementation | 0.37 | metacpan |
XML::Atom::Base | metacpan | ||
XML::Atom::Category | metacpan | ||
XML::Atom::Client | A client for the Atom API | metacpan | |
XML::Atom::Content | metacpan | ||
XML::Atom::Entry | Atom entry | metacpan | |
XML::Atom::ErrorHandler | metacpan | ||
XML::Atom::Feed | Atom feed | metacpan | |
XML::Atom::Link | metacpan | ||
XML::Atom::Person | Author or contributor object | metacpan | |
XML::Atom::Server | A server for the Atom API | metacpan | |
XML::Atom::Thing | metacpan | ||
XML::Atom::Util | Utility functions | metacpan |