Security Advisories (2)
CPANSA-Mozilla-CA-2011-34
Google Chrome user alibo encountered an active "man in the middle" (MITM) attack on secure SSL connections to Google servers. The fraudulent certificate was mis-issued by DigiNotar, a Dutch Certificate Authority. DigiNotar has reported evidence that other fraudulent certificates were issued and in active use but the full extent of the compromise is not known.
CVE-2024-39689
(2024-06-11)
ECM GlobalTrust 2000 root certificates have been distrusted
- https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/XpknYMPO8dI
- https://groups.google.com/a/ccadb.org/g/public/c/wRs-zec8w7k/m/G_9QprJ2AQAJ
- https://github.com/certifi/python-certifi/security/advisories/GHSA-248v-346w-9cwc
- https://github.com/certifi/python-certifi/commit/bd8153872e9c6fc98f4023df9c2deaffea2fa463
Modules
Mozilla's CA cert bundle in PEM format
Other files
Module Install Instructions
To install Mozilla::CA, copy and paste the appropriate command in to your terminal.
cpanm Mozilla::CA
perl -MCPAN -e shell
install Mozilla::CA
For more information on module installation, please visit the detailed CPAN module installation guide.