Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/934728?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/934728?format=api", "purl": "pkg:deb/debian/perl@0?distro=trixie", "type": "deb", "namespace": "debian", "name": "perl", "version": "0", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "5.8.0-7", "latest_non_vulnerable_version": "5.40.1-7", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41358?format=api", "vulnerability_id": "VCID-4ab2-z2zk-q7fw", "summary": "Multiple packages suffer from RUNPATH issues that may allow users in the\n \"portage\" group to escalate privileges.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-4278", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22335", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22467", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22641", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22684", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22475", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22556", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.2261", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22626", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22585", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22531", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22545", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.2254", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22489", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-4278" }, { "reference_url": "http://secunia.com/advisories/17232", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17232" }, { "reference_url": "http://secunia.com/advisories/55314", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/55314" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200510-14.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200510-14.xml" }, { "reference_url": "http://www.osvdb.org/20086", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/20086" }, { "reference_url": "http://www.securityfocus.com/bid/15120", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/15120" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2119", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2119" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.4.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4278", "reference_id": "CVE-2005-4278", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4278" }, { "reference_url": "https://security.gentoo.org/glsa/200510-14", "reference_id": "GLSA-200510-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200510-14" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/934728?format=api", "purl": "pkg:deb/debian/perl@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934721?format=api", "purl": "pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-r3y5-1dk2-pyfc" }, { "vulnerability": "VCID-vgg2-vymx-b3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934719?format=api", "purl": "pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vgg2-vymx-b3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934723?format=api", "purl": "pkg:deb/debian/perl@5.40.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934722?format=api", "purl": "pkg:deb/debian/perl@5.40.1-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-4278" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4ab2-z2zk-q7fw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/110326?format=api", "vulnerability_id": "VCID-8k36-z9xy-3bd4", "summary": "Perl in Apple Mac OS X Server 10.3.9 does not properly drop privileges when using the \"$<\" variable to set uid, which allows attackers to gain privileges.", "references": [ { "reference_url": "http://docs.info.apple.com/article.html?artnum=303382", "reference_id": "", "reference_type": "", "scores": [], "url": "http://docs.info.apple.com/article.html?artnum=303382" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2006/Mar/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2006/Mar/msg00000.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-4217", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80466", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80355", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80361", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80381", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.8037", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80399", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80409", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80427", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80412", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80406", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80435", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80436", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.8044", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-4217" }, { "reference_url": "http://secunia.com/advisories/17922", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17922" }, { "reference_url": "http://secunia.com/advisories/19064", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19064" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23561", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23561" }, { "reference_url": "http://www.osvdb.org/21800", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/21800" }, { "reference_url": "http://www.securityfocus.com/bid/15833", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/15833" }, { "reference_url": "http://www.securityfocus.com/bid/16907", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/16907" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA06-062A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA06-062A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2869", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2869" }, { "reference_url": "http://www.vupen.com/english/advisories/2006/0791", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2006/0791" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4217", "reference_id": "CVE-2005-4217", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4217" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/934728?format=api", "purl": "pkg:deb/debian/perl@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934721?format=api", "purl": "pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-r3y5-1dk2-pyfc" }, { "vulnerability": "VCID-vgg2-vymx-b3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934719?format=api", "purl": "pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vgg2-vymx-b3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934723?format=api", "purl": "pkg:deb/debian/perl@5.40.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934722?format=api", "purl": "pkg:deb/debian/perl@5.40.1-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-4217" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8k36-z9xy-3bd4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85380?format=api", "vulnerability_id": "VCID-c8d4-fyq4-3bdr", "summary": "perl: out-of-bounds read and buffer overflow in functions VDir::MapPathA and VDir::MapPathW via a crafted drive letter or a pInName argument", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8608.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8608.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8608", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02874", "scoring_system": "epss", "scoring_elements": "0.86212", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02874", "scoring_system": "epss", "scoring_elements": "0.86222", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02874", "scoring_system": "epss", "scoring_elements": "0.8624", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02874", "scoring_system": "epss", "scoring_elements": "0.86241", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02874", "scoring_system": "epss", "scoring_elements": "0.86259", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02874", "scoring_system": "epss", "scoring_elements": "0.8627", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02874", "scoring_system": "epss", "scoring_elements": "0.86285", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02874", "scoring_system": "epss", "scoring_elements": "0.86282", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02874", "scoring_system": "epss", "scoring_elements": "0.86279", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02874", "scoring_system": "epss", "scoring_elements": "0.86295", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02874", "scoring_system": "epss", "scoring_elements": "0.86299", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02874", "scoring_system": "epss", "scoring_elements": "0.86292", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02874", "scoring_system": "epss", "scoring_elements": "0.86311", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8608" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857318", "reference_id": "1857318", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857318" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/934728?format=api", "purl": "pkg:deb/debian/perl@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934721?format=api", "purl": "pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-r3y5-1dk2-pyfc" }, { "vulnerability": "VCID-vgg2-vymx-b3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934719?format=api", "purl": "pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vgg2-vymx-b3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934723?format=api", "purl": "pkg:deb/debian/perl@5.40.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934722?format=api", "purl": "pkg:deb/debian/perl@5.40.1-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-8608" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c8d4-fyq4-3bdr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77945?format=api", "vulnerability_id": "VCID-duky-tw31-xuhe", "summary": "perl: Perl for Windows binary hijacking vulnerability", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-47039.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-47039.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-47039", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23534", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23667", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23646", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25288", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25445", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25481", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25252", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.2532", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25365", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25376", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25335", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25282", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-47039" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2249525", "reference_id": "2249525", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-02T20:02:55Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2249525" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746", "reference_id": "bugreport.cgi?bug=1056746", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-02T20:02:55Z/" } ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9", "reference_id": "cpe:/o:redhat:enterprise_linux:9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-47039", "reference_id": "CVE-2023-47039", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-02T20:02:55Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-47039" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/934728?format=api", "purl": "pkg:deb/debian/perl@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934721?format=api", "purl": "pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-r3y5-1dk2-pyfc" }, { "vulnerability": "VCID-vgg2-vymx-b3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934719?format=api", "purl": "pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vgg2-vymx-b3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934723?format=api", "purl": "pkg:deb/debian/perl@5.40.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934722?format=api", "purl": "pkg:deb/debian/perl@5.40.1-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-47039" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-duky-tw31-xuhe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/166764?format=api", "vulnerability_id": "VCID-fe7j-gxfx-1ufh", "summary": "Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12814", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06061", "scoring_system": "epss", "scoring_elements": "0.90775", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.06061", "scoring_system": "epss", "scoring_elements": "0.90763", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06061", "scoring_system": "epss", "scoring_elements": "0.90699", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06061", "scoring_system": "epss", "scoring_elements": "0.90705", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06061", "scoring_system": "epss", "scoring_elements": "0.90716", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06061", "scoring_system": "epss", "scoring_elements": "0.90726", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06061", "scoring_system": "epss", "scoring_elements": "0.90737", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06061", "scoring_system": "epss", "scoring_elements": "0.90743", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06061", "scoring_system": "epss", "scoring_elements": "0.90751", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06061", "scoring_system": "epss", "scoring_elements": "0.90748", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06061", "scoring_system": "epss", "scoring_elements": "0.90767", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06061", "scoring_system": "epss", "scoring_elements": "0.90764", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12814" }, { "reference_url": "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1", "reference_id": "", "reference_type": "", "scores": [], "url": "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1" }, { "reference_url": "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1", "reference_id": "", "reference_type": "", "scores": [], "url": "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1" }, { "reference_url": "https://rt.perl.org/Public/Bug/Display.html?id=131665", "reference_id": "", "reference_type": "", "scores": [], "url": "https://rt.perl.org/Public/Bug/Display.html?id=131665" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20180426-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20180426-0001/" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "reference_url": "http://www.securityfocus.com/bid/101051", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101051" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12814", "reference_id": "CVE-2017-12814", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12814" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/934728?format=api", "purl": "pkg:deb/debian/perl@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934721?format=api", "purl": "pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-r3y5-1dk2-pyfc" }, { "vulnerability": "VCID-vgg2-vymx-b3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934719?format=api", "purl": "pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vgg2-vymx-b3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934723?format=api", "purl": "pkg:deb/debian/perl@5.40.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934722?format=api", "purl": "pkg:deb/debian/perl@5.40.1-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-12814" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fe7j-gxfx-1ufh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/107126?format=api", "vulnerability_id": "VCID-mmaj-ak8p-efcm", "summary": "Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0377", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.14668", "scoring_system": "epss", "scoring_elements": "0.94445", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.14668", "scoring_system": "epss", "scoring_elements": "0.94452", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.14668", "scoring_system": "epss", "scoring_elements": "0.9446", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.14668", "scoring_system": "epss", "scoring_elements": "0.94463", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.14668", "scoring_system": "epss", "scoring_elements": "0.94473", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.14668", "scoring_system": "epss", "scoring_elements": "0.94476", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.14668", "scoring_system": "epss", "scoring_elements": "0.9448", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.14668", "scoring_system": "epss", "scoring_elements": "0.94482", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.14668", "scoring_system": "epss", "scoring_elements": "0.94496", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.14668", "scoring_system": "epss", "scoring_elements": "0.945", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.14668", "scoring_system": "epss", "scoring_elements": "0.94503", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.14668", "scoring_system": "epss", "scoring_elements": "0.94504", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0377" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/934728?format=api", "purl": "pkg:deb/debian/perl@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934721?format=api", "purl": "pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-r3y5-1dk2-pyfc" }, { "vulnerability": "VCID-vgg2-vymx-b3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934719?format=api", "purl": "pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vgg2-vymx-b3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934723?format=api", "purl": "pkg:deb/debian/perl@5.40.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934722?format=api", "purl": "pkg:deb/debian/perl@5.40.1-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-0377" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mmaj-ak8p-efcm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78139?format=api", "vulnerability_id": "VCID-nxx4-txsk-6ucr", "summary": "perl: stack-based crash in S_find_uninit_var()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48522.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48522.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48522", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.17318", "scoring_system": "epss", "scoring_elements": "0.9502", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.17318", "scoring_system": "epss", "scoring_elements": "0.95059", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.17318", "scoring_system": "epss", "scoring_elements": "0.95057", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.17318", "scoring_system": "epss", "scoring_elements": "0.9506", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.17318", "scoring_system": "epss", "scoring_elements": "0.95022", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.17318", "scoring_system": "epss", "scoring_elements": "0.95024", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.17318", "scoring_system": "epss", "scoring_elements": "0.95032", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.17318", "scoring_system": "epss", "scoring_elements": "0.95036", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.17318", "scoring_system": "epss", "scoring_elements": "0.95042", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.17318", "scoring_system": "epss", "scoring_elements": "0.95043", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.17318", "scoring_system": "epss", "scoring_elements": "0.95046", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.17318", "scoring_system": "epss", "scoring_elements": "0.95055", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48522" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234416", "reference_id": "2234416", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234416" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230915-0008/", "reference_id": "ntap-20230915-0008", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:20:55Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230915-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6206", "reference_id": "RHSA-2026:6206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6206" }, { "reference_url": "https://github.com/Perl/perl5/blob/79a7b254d85a10b65126ad99bf10e70480569d68/sv.c#L16336-L16345", "reference_id": "sv.c#L16336-L16345", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:20:55Z/" } ], "url": "https://github.com/Perl/perl5/blob/79a7b254d85a10b65126ad99bf10e70480569d68/sv.c#L16336-L16345" }, { "reference_url": "https://usn.ubuntu.com/6517-1/", "reference_id": "USN-6517-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6517-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/934728?format=api", "purl": "pkg:deb/debian/perl@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934721?format=api", "purl": "pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-r3y5-1dk2-pyfc" }, { "vulnerability": "VCID-vgg2-vymx-b3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934767?format=api", "purl": "pkg:deb/debian/perl@5.36.0-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934719?format=api", "purl": "pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vgg2-vymx-b3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934723?format=api", "purl": "pkg:deb/debian/perl@5.40.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934722?format=api", "purl": "pkg:deb/debian/perl@5.40.1-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-48522" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nxx4-txsk-6ucr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56827?format=api", "vulnerability_id": "VCID-pwt9-n1n8-sfew", "summary": "Multiple vulnerabilities were found in Perl, the worst of which\n could allow a local attacker to cause a Denial of Service condition.", "references": [ { "reference_url": "http://bugs.gentoo.org/show_bug.cgi?id=313565", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.gentoo.org/show_bug.cgi?id=313565" }, { "reference_url": "http://perldoc.perl.org/perl5100delta.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://perldoc.perl.org/perl5100delta.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1158.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1158.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1158", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67415", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67295", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67332", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67355", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67383", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67396", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67417", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67405", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67371", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67406", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67418", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1158" }, { "reference_url": "http://secunia.com/advisories/55314", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/55314" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/04/08/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/04/08/9" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/04/14/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/04/14/3" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=580605", "reference_id": "580605", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=580605" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1158", "reference_id": "CVE-2010-1158", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1158" }, { "reference_url": "https://security.gentoo.org/glsa/201311-17", "reference_id": "GLSA-201311-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-17" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/934728?format=api", "purl": "pkg:deb/debian/perl@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934721?format=api", "purl": "pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-r3y5-1dk2-pyfc" }, { "vulnerability": "VCID-vgg2-vymx-b3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934719?format=api", "purl": "pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vgg2-vymx-b3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934723?format=api", "purl": "pkg:deb/debian/perl@5.40.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934722?format=api", "purl": "pkg:deb/debian/perl@5.40.1-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie" } ], "aliases": [ "CVE-2010-1158" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pwt9-n1n8-sfew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70411?format=api", "vulnerability_id": "VCID-x5rc-hajz-p7gp", "summary": "perl: Perl 5.34, 5.36, 5.38 and 5.40 are vulnerable to a heap buffer overflow when transliterating non-ASCII bytes", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56406.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56406.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-56406", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28647", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32619", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32537", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32569", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32555", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32581", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32618", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32688", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32723", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32544", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32592", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-56406" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359290", "reference_id": "2359290", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359290" }, { "reference_url": "https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch", "reference_id": "87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-16T14:04:16Z/" } ], "url": "https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch" }, { "reference_url": "https://metacpan.org/release/SHAY/perl-5.38.4/changes", "reference_id": "changes", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-16T14:04:16Z/" } ], "url": "https://metacpan.org/release/SHAY/perl-5.38.4/changes" }, { "reference_url": "https://metacpan.org/release/SHAY/perl-5.40.2/changes", "reference_id": "changes", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-16T14:04:16Z/" } ], "url": "https://metacpan.org/release/SHAY/perl-5.40.2/changes" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7500", "reference_id": "RHSA-2025:7500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7500" }, { "reference_url": "https://usn.ubuntu.com/7434-1/", "reference_id": "USN-7434-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7434-1/" }, { "reference_url": "https://usn.ubuntu.com/7434-2/", "reference_id": "USN-7434-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7434-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/934728?format=api", "purl": "pkg:deb/debian/perl@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934721?format=api", "purl": "pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-r3y5-1dk2-pyfc" }, { "vulnerability": "VCID-vgg2-vymx-b3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934774?format=api", "purl": "pkg:deb/debian/perl@5.36.0-7%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934719?format=api", "purl": "pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-vgg2-vymx-b3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934775?format=api", "purl": "pkg:deb/debian/perl@5.40.1-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934723?format=api", "purl": "pkg:deb/debian/perl@5.40.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/934722?format=api", "purl": "pkg:deb/debian/perl@5.40.1-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-56406" ], "risk_score": 3.8, "exploitability": "0.5", "weighted_severity": "7.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x5rc-hajz-p7gp" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie" }