Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/perl@0?distro=trixie
Typedeb
Namespacedebian
Nameperl
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version5.8.0-7
Latest_non_vulnerable_version5.40.1-7
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4ab2-z2zk-q7fw
vulnerability_id VCID-4ab2-z2zk-q7fw
summary
Multiple packages suffer from RUNPATH issues that may allow users in the
    "portage" group to escalate privileges.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-4278
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22335
published_at 2026-04-24T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22467
published_at 2026-04-01T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22641
published_at 2026-04-02T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22684
published_at 2026-04-04T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22475
published_at 2026-04-07T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22556
published_at 2026-04-08T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.2261
published_at 2026-04-09T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22626
published_at 2026-04-11T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22585
published_at 2026-04-12T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22531
published_at 2026-04-13T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22545
published_at 2026-04-16T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.2254
published_at 2026-04-18T12:55:00Z
12
value 0.00075
scoring_system epss
scoring_elements 0.22489
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-4278
1
reference_url http://secunia.com/advisories/17232
reference_id
reference_type
scores
url http://secunia.com/advisories/17232
2
reference_url http://secunia.com/advisories/55314
reference_id
reference_type
scores
url http://secunia.com/advisories/55314
3
reference_url http://www.gentoo.org/security/en/glsa/glsa-200510-14.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200510-14.xml
4
reference_url http://www.osvdb.org/20086
reference_id
reference_type
scores
url http://www.osvdb.org/20086
5
reference_url http://www.securityfocus.com/bid/15120
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15120
6
reference_url http://www.vupen.com/english/advisories/2005/2119
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2119
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:larry_wall:perl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:larry_wall:perl:5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.3:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:larry_wall:perl:5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.4:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:larry_wall:perl:5.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.4.5:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:larry_wall:perl:5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.5:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:larry_wall:perl:5.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.5.3:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:larry_wall:perl:5.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.6.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:larry_wall:perl:5.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:larry_wall:perl:5.8.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:larry_wall:perl:5.8.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:larry_wall:perl:5.8.4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.2.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:larry_wall:perl:5.8.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:larry_wall:perl:5.8.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:larry_wall:perl:5.8.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.5:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-4278
reference_id CVE-2005-4278
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2005-4278
25
reference_url https://security.gentoo.org/glsa/200510-14
reference_id GLSA-200510-14
reference_type
scores
url https://security.gentoo.org/glsa/200510-14
fixed_packages
0
url pkg:deb/debian/perl@0?distro=trixie
purl pkg:deb/debian/perl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie
1
url pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-r3y5-1dk2-pyfc
1
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/perl@5.40.1-6?distro=trixie
purl pkg:deb/debian/perl@5.40.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie
4
url pkg:deb/debian/perl@5.40.1-7?distro=trixie
purl pkg:deb/debian/perl@5.40.1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie
aliases CVE-2005-4278
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ab2-z2zk-q7fw
1
url VCID-8k36-z9xy-3bd4
vulnerability_id VCID-8k36-z9xy-3bd4
summary Perl in Apple Mac OS X Server 10.3.9 does not properly drop privileges when using the "$<" variable to set uid, which allows attackers to gain privileges.
references
0
reference_url http://docs.info.apple.com/article.html?artnum=303382
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=303382
1
reference_url http://lists.apple.com/archives/security-announce/2006/Mar/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2006/Mar/msg00000.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-4217
reference_id
reference_type
scores
0
value 0.01398
scoring_system epss
scoring_elements 0.80466
published_at 2026-04-24T12:55:00Z
1
value 0.01398
scoring_system epss
scoring_elements 0.80355
published_at 2026-04-01T12:55:00Z
2
value 0.01398
scoring_system epss
scoring_elements 0.80361
published_at 2026-04-02T12:55:00Z
3
value 0.01398
scoring_system epss
scoring_elements 0.80381
published_at 2026-04-04T12:55:00Z
4
value 0.01398
scoring_system epss
scoring_elements 0.8037
published_at 2026-04-07T12:55:00Z
5
value 0.01398
scoring_system epss
scoring_elements 0.80399
published_at 2026-04-08T12:55:00Z
6
value 0.01398
scoring_system epss
scoring_elements 0.80409
published_at 2026-04-09T12:55:00Z
7
value 0.01398
scoring_system epss
scoring_elements 0.80427
published_at 2026-04-11T12:55:00Z
8
value 0.01398
scoring_system epss
scoring_elements 0.80412
published_at 2026-04-12T12:55:00Z
9
value 0.01398
scoring_system epss
scoring_elements 0.80406
published_at 2026-04-13T12:55:00Z
10
value 0.01398
scoring_system epss
scoring_elements 0.80435
published_at 2026-04-16T12:55:00Z
11
value 0.01398
scoring_system epss
scoring_elements 0.80436
published_at 2026-04-18T12:55:00Z
12
value 0.01398
scoring_system epss
scoring_elements 0.8044
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-4217
3
reference_url http://secunia.com/advisories/17922
reference_id
reference_type
scores
url http://secunia.com/advisories/17922
4
reference_url http://secunia.com/advisories/19064
reference_id
reference_type
scores
url http://secunia.com/advisories/19064
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/23561
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/23561
6
reference_url http://www.osvdb.org/21800
reference_id
reference_type
scores
url http://www.osvdb.org/21800
7
reference_url http://www.securityfocus.com/bid/15833
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15833
8
reference_url http://www.securityfocus.com/bid/16907
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/16907
9
reference_url http://www.us-cert.gov/cas/techalerts/TA06-062A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA06-062A.html
10
reference_url http://www.vupen.com/english/advisories/2005/2869
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2869
11
reference_url http://www.vupen.com/english/advisories/2006/0791
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/0791
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-4217
reference_id CVE-2005-4217
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-4217
fixed_packages
0
url pkg:deb/debian/perl@0?distro=trixie
purl pkg:deb/debian/perl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie
1
url pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-r3y5-1dk2-pyfc
1
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/perl@5.40.1-6?distro=trixie
purl pkg:deb/debian/perl@5.40.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie
4
url pkg:deb/debian/perl@5.40.1-7?distro=trixie
purl pkg:deb/debian/perl@5.40.1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie
aliases CVE-2005-4217
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8k36-z9xy-3bd4
2
url VCID-c8d4-fyq4-3bdr
vulnerability_id VCID-c8d4-fyq4-3bdr
summary perl: out-of-bounds read and buffer overflow in functions VDir::MapPathA and VDir::MapPathW via a crafted drive letter or a pInName argument
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8608.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8608.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8608
reference_id
reference_type
scores
0
value 0.02874
scoring_system epss
scoring_elements 0.86212
published_at 2026-04-01T12:55:00Z
1
value 0.02874
scoring_system epss
scoring_elements 0.86222
published_at 2026-04-02T12:55:00Z
2
value 0.02874
scoring_system epss
scoring_elements 0.8624
published_at 2026-04-04T12:55:00Z
3
value 0.02874
scoring_system epss
scoring_elements 0.86241
published_at 2026-04-07T12:55:00Z
4
value 0.02874
scoring_system epss
scoring_elements 0.86259
published_at 2026-04-08T12:55:00Z
5
value 0.02874
scoring_system epss
scoring_elements 0.8627
published_at 2026-04-09T12:55:00Z
6
value 0.02874
scoring_system epss
scoring_elements 0.86285
published_at 2026-04-11T12:55:00Z
7
value 0.02874
scoring_system epss
scoring_elements 0.86282
published_at 2026-04-12T12:55:00Z
8
value 0.02874
scoring_system epss
scoring_elements 0.86279
published_at 2026-04-13T12:55:00Z
9
value 0.02874
scoring_system epss
scoring_elements 0.86295
published_at 2026-04-16T12:55:00Z
10
value 0.02874
scoring_system epss
scoring_elements 0.86299
published_at 2026-04-18T12:55:00Z
11
value 0.02874
scoring_system epss
scoring_elements 0.86292
published_at 2026-04-21T12:55:00Z
12
value 0.02874
scoring_system epss
scoring_elements 0.86311
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8608
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1857318
reference_id 1857318
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1857318
fixed_packages
0
url pkg:deb/debian/perl@0?distro=trixie
purl pkg:deb/debian/perl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie
1
url pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-r3y5-1dk2-pyfc
1
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/perl@5.40.1-6?distro=trixie
purl pkg:deb/debian/perl@5.40.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie
4
url pkg:deb/debian/perl@5.40.1-7?distro=trixie
purl pkg:deb/debian/perl@5.40.1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie
aliases CVE-2015-8608
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c8d4-fyq4-3bdr
3
url VCID-duky-tw31-xuhe
vulnerability_id VCID-duky-tw31-xuhe
summary perl: Perl for Windows binary hijacking vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-47039.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-47039.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-47039
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23534
published_at 2026-04-24T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23667
published_at 2026-04-18T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.23646
published_at 2026-04-21T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25288
published_at 2026-04-16T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25445
published_at 2026-04-02T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.25481
published_at 2026-04-04T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25252
published_at 2026-04-07T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.2532
published_at 2026-04-08T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.25365
published_at 2026-04-09T12:55:00Z
9
value 0.00089
scoring_system epss
scoring_elements 0.25376
published_at 2026-04-11T12:55:00Z
10
value 0.00089
scoring_system epss
scoring_elements 0.25335
published_at 2026-04-12T12:55:00Z
11
value 0.00089
scoring_system epss
scoring_elements 0.25282
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-47039
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2249525
reference_id 2249525
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-02T20:02:55Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2249525
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746
reference_id bugreport.cgi?bug=1056746
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-02T20:02:55Z/
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
8
reference_url https://access.redhat.com/security/cve/CVE-2023-47039
reference_id CVE-2023-47039
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-02T20:02:55Z/
url https://access.redhat.com/security/cve/CVE-2023-47039
fixed_packages
0
url pkg:deb/debian/perl@0?distro=trixie
purl pkg:deb/debian/perl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie
1
url pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-r3y5-1dk2-pyfc
1
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/perl@5.40.1-6?distro=trixie
purl pkg:deb/debian/perl@5.40.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie
4
url pkg:deb/debian/perl@5.40.1-7?distro=trixie
purl pkg:deb/debian/perl@5.40.1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie
aliases CVE-2023-47039
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-duky-tw31-xuhe
4
url VCID-fe7j-gxfx-1ufh
vulnerability_id VCID-fe7j-gxfx-1ufh
summary Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12814
reference_id
reference_type
scores
0
value 0.06061
scoring_system epss
scoring_elements 0.90775
published_at 2026-04-24T12:55:00Z
1
value 0.06061
scoring_system epss
scoring_elements 0.90763
published_at 2026-04-21T12:55:00Z
2
value 0.06061
scoring_system epss
scoring_elements 0.90699
published_at 2026-04-01T12:55:00Z
3
value 0.06061
scoring_system epss
scoring_elements 0.90705
published_at 2026-04-02T12:55:00Z
4
value 0.06061
scoring_system epss
scoring_elements 0.90716
published_at 2026-04-04T12:55:00Z
5
value 0.06061
scoring_system epss
scoring_elements 0.90726
published_at 2026-04-07T12:55:00Z
6
value 0.06061
scoring_system epss
scoring_elements 0.90737
published_at 2026-04-08T12:55:00Z
7
value 0.06061
scoring_system epss
scoring_elements 0.90743
published_at 2026-04-09T12:55:00Z
8
value 0.06061
scoring_system epss
scoring_elements 0.90751
published_at 2026-04-12T12:55:00Z
9
value 0.06061
scoring_system epss
scoring_elements 0.90748
published_at 2026-04-13T12:55:00Z
10
value 0.06061
scoring_system epss
scoring_elements 0.90767
published_at 2026-04-16T12:55:00Z
11
value 0.06061
scoring_system epss
scoring_elements 0.90764
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12814
1
reference_url https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1
reference_id
reference_type
scores
url https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1
2
reference_url https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1
reference_id
reference_type
scores
url https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1
3
reference_url https://rt.perl.org/Public/Bug/Display.html?id=131665
reference_id
reference_type
scores
url https://rt.perl.org/Public/Bug/Display.html?id=131665
4
reference_url https://security.netapp.com/advisory/ntap-20180426-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180426-0001/
5
reference_url https://www.oracle.com/security-alerts/cpujul2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujul2020.html
6
reference_url http://www.securityfocus.com/bid/101051
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101051
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-12814
reference_id CVE-2017-12814
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-12814
fixed_packages
0
url pkg:deb/debian/perl@0?distro=trixie
purl pkg:deb/debian/perl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie
1
url pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-r3y5-1dk2-pyfc
1
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/perl@5.40.1-6?distro=trixie
purl pkg:deb/debian/perl@5.40.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie
4
url pkg:deb/debian/perl@5.40.1-7?distro=trixie
purl pkg:deb/debian/perl@5.40.1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie
aliases CVE-2017-12814
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fe7j-gxfx-1ufh
5
url VCID-mmaj-ak8p-efcm
vulnerability_id VCID-mmaj-ak8p-efcm
summary Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0377
reference_id
reference_type
scores
0
value 0.14668
scoring_system epss
scoring_elements 0.94445
published_at 2026-04-01T12:55:00Z
1
value 0.14668
scoring_system epss
scoring_elements 0.94452
published_at 2026-04-02T12:55:00Z
2
value 0.14668
scoring_system epss
scoring_elements 0.9446
published_at 2026-04-04T12:55:00Z
3
value 0.14668
scoring_system epss
scoring_elements 0.94463
published_at 2026-04-07T12:55:00Z
4
value 0.14668
scoring_system epss
scoring_elements 0.94473
published_at 2026-04-08T12:55:00Z
5
value 0.14668
scoring_system epss
scoring_elements 0.94476
published_at 2026-04-09T12:55:00Z
6
value 0.14668
scoring_system epss
scoring_elements 0.9448
published_at 2026-04-11T12:55:00Z
7
value 0.14668
scoring_system epss
scoring_elements 0.94482
published_at 2026-04-13T12:55:00Z
8
value 0.14668
scoring_system epss
scoring_elements 0.94496
published_at 2026-04-16T12:55:00Z
9
value 0.14668
scoring_system epss
scoring_elements 0.945
published_at 2026-04-18T12:55:00Z
10
value 0.14668
scoring_system epss
scoring_elements 0.94503
published_at 2026-04-21T12:55:00Z
11
value 0.14668
scoring_system epss
scoring_elements 0.94504
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0377
fixed_packages
0
url pkg:deb/debian/perl@0?distro=trixie
purl pkg:deb/debian/perl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie
1
url pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-r3y5-1dk2-pyfc
1
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/perl@5.40.1-6?distro=trixie
purl pkg:deb/debian/perl@5.40.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie
4
url pkg:deb/debian/perl@5.40.1-7?distro=trixie
purl pkg:deb/debian/perl@5.40.1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie
aliases CVE-2004-0377
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mmaj-ak8p-efcm
6
url VCID-nxx4-txsk-6ucr
vulnerability_id VCID-nxx4-txsk-6ucr
summary perl: stack-based crash in S_find_uninit_var()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48522.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48522.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48522
reference_id
reference_type
scores
0
value 0.17318
scoring_system epss
scoring_elements 0.9502
published_at 2026-04-02T12:55:00Z
1
value 0.17318
scoring_system epss
scoring_elements 0.95059
published_at 2026-04-24T12:55:00Z
2
value 0.17318
scoring_system epss
scoring_elements 0.95057
published_at 2026-04-18T12:55:00Z
3
value 0.17318
scoring_system epss
scoring_elements 0.9506
published_at 2026-04-21T12:55:00Z
4
value 0.17318
scoring_system epss
scoring_elements 0.95022
published_at 2026-04-04T12:55:00Z
5
value 0.17318
scoring_system epss
scoring_elements 0.95024
published_at 2026-04-07T12:55:00Z
6
value 0.17318
scoring_system epss
scoring_elements 0.95032
published_at 2026-04-08T12:55:00Z
7
value 0.17318
scoring_system epss
scoring_elements 0.95036
published_at 2026-04-09T12:55:00Z
8
value 0.17318
scoring_system epss
scoring_elements 0.95042
published_at 2026-04-11T12:55:00Z
9
value 0.17318
scoring_system epss
scoring_elements 0.95043
published_at 2026-04-12T12:55:00Z
10
value 0.17318
scoring_system epss
scoring_elements 0.95046
published_at 2026-04-13T12:55:00Z
11
value 0.17318
scoring_system epss
scoring_elements 0.95055
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48522
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2234416
reference_id 2234416
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2234416
3
reference_url https://security.netapp.com/advisory/ntap-20230915-0008/
reference_id ntap-20230915-0008
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:20:55Z/
url https://security.netapp.com/advisory/ntap-20230915-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2026:6206
reference_id RHSA-2026:6206
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6206
5
reference_url https://github.com/Perl/perl5/blob/79a7b254d85a10b65126ad99bf10e70480569d68/sv.c#L16336-L16345
reference_id sv.c#L16336-L16345
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:20:55Z/
url https://github.com/Perl/perl5/blob/79a7b254d85a10b65126ad99bf10e70480569d68/sv.c#L16336-L16345
6
reference_url https://usn.ubuntu.com/6517-1/
reference_id USN-6517-1
reference_type
scores
url https://usn.ubuntu.com/6517-1/
fixed_packages
0
url pkg:deb/debian/perl@0?distro=trixie
purl pkg:deb/debian/perl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie
1
url pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-r3y5-1dk2-pyfc
1
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/perl@5.36.0-4?distro=trixie
purl pkg:deb/debian/perl@5.36.0-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-4%3Fdistro=trixie
3
url pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/perl@5.40.1-6?distro=trixie
purl pkg:deb/debian/perl@5.40.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie
5
url pkg:deb/debian/perl@5.40.1-7?distro=trixie
purl pkg:deb/debian/perl@5.40.1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie
aliases CVE-2022-48522
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nxx4-txsk-6ucr
7
url VCID-pwt9-n1n8-sfew
vulnerability_id VCID-pwt9-n1n8-sfew
summary
Multiple vulnerabilities were found in Perl, the worst of which
    could allow a local attacker to cause a Denial of Service condition.
references
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=313565
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=313565
1
reference_url http://perldoc.perl.org/perl5100delta.html
reference_id
reference_type
scores
url http://perldoc.perl.org/perl5100delta.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1158.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1158.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1158
reference_id
reference_type
scores
0
value 0.00533
scoring_system epss
scoring_elements 0.67415
published_at 2026-04-24T12:55:00Z
1
value 0.00533
scoring_system epss
scoring_elements 0.67295
published_at 2026-04-01T12:55:00Z
2
value 0.00533
scoring_system epss
scoring_elements 0.67332
published_at 2026-04-07T12:55:00Z
3
value 0.00533
scoring_system epss
scoring_elements 0.67355
published_at 2026-04-04T12:55:00Z
4
value 0.00533
scoring_system epss
scoring_elements 0.67383
published_at 2026-04-08T12:55:00Z
5
value 0.00533
scoring_system epss
scoring_elements 0.67396
published_at 2026-04-21T12:55:00Z
6
value 0.00533
scoring_system epss
scoring_elements 0.67417
published_at 2026-04-11T12:55:00Z
7
value 0.00533
scoring_system epss
scoring_elements 0.67405
published_at 2026-04-12T12:55:00Z
8
value 0.00533
scoring_system epss
scoring_elements 0.67371
published_at 2026-04-13T12:55:00Z
9
value 0.00533
scoring_system epss
scoring_elements 0.67406
published_at 2026-04-16T12:55:00Z
10
value 0.00533
scoring_system epss
scoring_elements 0.67418
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1158
4
reference_url http://secunia.com/advisories/55314
reference_id
reference_type
scores
url http://secunia.com/advisories/55314
5
reference_url http://www.openwall.com/lists/oss-security/2010/04/08/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/04/08/9
6
reference_url http://www.openwall.com/lists/oss-security/2010/04/14/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/04/14/3
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=580605
reference_id 580605
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=580605
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1158
reference_id CVE-2010-1158
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-1158
18
reference_url https://security.gentoo.org/glsa/201311-17
reference_id GLSA-201311-17
reference_type
scores
url https://security.gentoo.org/glsa/201311-17
fixed_packages
0
url pkg:deb/debian/perl@0?distro=trixie
purl pkg:deb/debian/perl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie
1
url pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-r3y5-1dk2-pyfc
1
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/perl@5.40.1-6?distro=trixie
purl pkg:deb/debian/perl@5.40.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie
4
url pkg:deb/debian/perl@5.40.1-7?distro=trixie
purl pkg:deb/debian/perl@5.40.1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie
aliases CVE-2010-1158
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pwt9-n1n8-sfew
8
url VCID-x5rc-hajz-p7gp
vulnerability_id VCID-x5rc-hajz-p7gp
summary perl: Perl 5.34, 5.36, 5.38 and 5.40 are vulnerable to a heap buffer overflow when transliterating non-ASCII bytes
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56406.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56406.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-56406
reference_id
reference_type
scores
0
value 0.00107
scoring_system epss
scoring_elements 0.28647
published_at 2026-04-24T12:55:00Z
1
value 0.00131
scoring_system epss
scoring_elements 0.32619
published_at 2026-04-11T12:55:00Z
2
value 0.00131
scoring_system epss
scoring_elements 0.32537
published_at 2026-04-21T12:55:00Z
3
value 0.00131
scoring_system epss
scoring_elements 0.32569
published_at 2026-04-18T12:55:00Z
4
value 0.00131
scoring_system epss
scoring_elements 0.32555
published_at 2026-04-13T12:55:00Z
5
value 0.00131
scoring_system epss
scoring_elements 0.32581
published_at 2026-04-12T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.32618
published_at 2026-04-09T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32688
published_at 2026-04-02T12:55:00Z
8
value 0.00131
scoring_system epss
scoring_elements 0.32723
published_at 2026-04-04T12:55:00Z
9
value 0.00131
scoring_system epss
scoring_elements 0.32544
published_at 2026-04-07T12:55:00Z
10
value 0.00131
scoring_system epss
scoring_elements 0.32592
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-56406
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359290
reference_id 2359290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2359290
4
reference_url https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch
reference_id 87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-16T14:04:16Z/
url https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch
5
reference_url https://metacpan.org/release/SHAY/perl-5.38.4/changes
reference_id changes
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-16T14:04:16Z/
url https://metacpan.org/release/SHAY/perl-5.38.4/changes
6
reference_url https://metacpan.org/release/SHAY/perl-5.40.2/changes
reference_id changes
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-16T14:04:16Z/
url https://metacpan.org/release/SHAY/perl-5.40.2/changes
7
reference_url https://access.redhat.com/errata/RHSA-2025:7500
reference_id RHSA-2025:7500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7500
8
reference_url https://usn.ubuntu.com/7434-1/
reference_id USN-7434-1
reference_type
scores
url https://usn.ubuntu.com/7434-1/
9
reference_url https://usn.ubuntu.com/7434-2/
reference_id USN-7434-2
reference_type
scores
url https://usn.ubuntu.com/7434-2/
fixed_packages
0
url pkg:deb/debian/perl@0?distro=trixie
purl pkg:deb/debian/perl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie
1
url pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-r3y5-1dk2-pyfc
1
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/perl@5.36.0-7%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/perl@5.36.0-7%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/perl@5.40.1-3?distro=trixie
purl pkg:deb/debian/perl@5.40.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-3%3Fdistro=trixie
5
url pkg:deb/debian/perl@5.40.1-6?distro=trixie
purl pkg:deb/debian/perl@5.40.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie
6
url pkg:deb/debian/perl@5.40.1-7?distro=trixie
purl pkg:deb/debian/perl@5.40.1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie
aliases CVE-2024-56406
risk_score 3.8
exploitability 0.5
weighted_severity 7.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x5rc-hajz-p7gp
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie