Lookup for vulnerable packages by Package URL.

GET /api/packages/934728?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/934728?format=api",
    "purl": "pkg:deb/debian/perl@0?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "perl",
    "version": "0",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "5.8.0-7",
    "latest_non_vulnerable_version": "5.40.1-7",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41358?format=api",
            "vulnerability_id": "VCID-4ab2-z2zk-q7fw",
            "summary": "Multiple packages suffer from RUNPATH issues that may allow users in the\n    \"portage\" group to escalate privileges.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-4278",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22335",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22467",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22641",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22684",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22475",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22556",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2261",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22626",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22585",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22531",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22545",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2254",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22489",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-4278"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17232",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17232"
                },
                {
                    "reference_url": "http://secunia.com/advisories/55314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/55314"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200510-14.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200510-14.xml"
                },
                {
                    "reference_url": "http://www.osvdb.org/20086",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.osvdb.org/20086"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/15120",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/15120"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2005/2119",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2005/2119"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:larry_wall:perl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:larry_wall:perl:5.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:larry_wall:perl:5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.4.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:larry_wall:perl:5.4.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.4.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:larry_wall:perl:5.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.5.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:larry_wall:perl:5.5.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.5.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:larry_wall:perl:5.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.4.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.2.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.4.2.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.2.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.4.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.4.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.4.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4278",
                    "reference_id": "CVE-2005-4278",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4278"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200510-14",
                    "reference_id": "GLSA-200510-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200510-14"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934728?format=api",
                    "purl": "pkg:deb/debian/perl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934721?format=api",
                    "purl": "pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r3y5-1dk2-pyfc"
                        },
                        {
                            "vulnerability": "VCID-vgg2-vymx-b3fe"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934719?format=api",
                    "purl": "pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vgg2-vymx-b3fe"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934723?format=api",
                    "purl": "pkg:deb/debian/perl@5.40.1-6?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934722?format=api",
                    "purl": "pkg:deb/debian/perl@5.40.1-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2005-4278"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4ab2-z2zk-q7fw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/110326?format=api",
            "vulnerability_id": "VCID-8k36-z9xy-3bd4",
            "summary": "Perl in Apple Mac OS X Server 10.3.9 does not properly drop privileges when using the \"$<\" variable to set uid, which allows attackers to gain privileges.",
            "references": [
                {
                    "reference_url": "http://docs.info.apple.com/article.html?artnum=303382",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://docs.info.apple.com/article.html?artnum=303382"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2006/Mar/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2006/Mar/msg00000.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-4217",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80466",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80355",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80361",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80381",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8037",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80399",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80409",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80427",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80412",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80406",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80435",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80436",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8044",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-4217"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17922"
                },
                {
                    "reference_url": "http://secunia.com/advisories/19064",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/19064"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23561",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23561"
                },
                {
                    "reference_url": "http://www.osvdb.org/21800",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.osvdb.org/21800"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/15833",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/15833"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/16907",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/16907"
                },
                {
                    "reference_url": "http://www.us-cert.gov/cas/techalerts/TA06-062A.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.us-cert.gov/cas/techalerts/TA06-062A.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2005/2869",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2005/2869"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2006/0791",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2006/0791"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4217",
                    "reference_id": "CVE-2005-4217",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4217"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934728?format=api",
                    "purl": "pkg:deb/debian/perl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934721?format=api",
                    "purl": "pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r3y5-1dk2-pyfc"
                        },
                        {
                            "vulnerability": "VCID-vgg2-vymx-b3fe"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934719?format=api",
                    "purl": "pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vgg2-vymx-b3fe"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934723?format=api",
                    "purl": "pkg:deb/debian/perl@5.40.1-6?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934722?format=api",
                    "purl": "pkg:deb/debian/perl@5.40.1-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2005-4217"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8k36-z9xy-3bd4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85380?format=api",
            "vulnerability_id": "VCID-c8d4-fyq4-3bdr",
            "summary": "perl: out-of-bounds read and buffer overflow in functions VDir::MapPathA and VDir::MapPathW via a crafted drive letter or a pInName argument",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8608.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8608.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86212",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86222",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8624",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86241",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86259",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8627",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86285",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86282",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86279",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86295",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86299",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86292",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86311",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8608"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857318",
                    "reference_id": "1857318",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857318"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934728?format=api",
                    "purl": "pkg:deb/debian/perl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934721?format=api",
                    "purl": "pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r3y5-1dk2-pyfc"
                        },
                        {
                            "vulnerability": "VCID-vgg2-vymx-b3fe"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934719?format=api",
                    "purl": "pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vgg2-vymx-b3fe"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934723?format=api",
                    "purl": "pkg:deb/debian/perl@5.40.1-6?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934722?format=api",
                    "purl": "pkg:deb/debian/perl@5.40.1-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-8608"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c8d4-fyq4-3bdr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77945?format=api",
            "vulnerability_id": "VCID-duky-tw31-xuhe",
            "summary": "perl: Perl for Windows binary hijacking vulnerability",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-47039.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-47039.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-47039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23534",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23667",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23646",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25288",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25445",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25481",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25252",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2532",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25365",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25376",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25335",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25282",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-47039"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2249525",
                    "reference_id": "2249525",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-02T20:02:55Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2249525"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746",
                    "reference_id": "bugreport.cgi?bug=1056746",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-02T20:02:55Z/"
                        }
                    ],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-47039",
                    "reference_id": "CVE-2023-47039",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-02T20:02:55Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-47039"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934728?format=api",
                    "purl": "pkg:deb/debian/perl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934721?format=api",
                    "purl": "pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r3y5-1dk2-pyfc"
                        },
                        {
                            "vulnerability": "VCID-vgg2-vymx-b3fe"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934719?format=api",
                    "purl": "pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vgg2-vymx-b3fe"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934723?format=api",
                    "purl": "pkg:deb/debian/perl@5.40.1-6?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934722?format=api",
                    "purl": "pkg:deb/debian/perl@5.40.1-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-47039"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-duky-tw31-xuhe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/166764?format=api",
            "vulnerability_id": "VCID-fe7j-gxfx-1ufh",
            "summary": "Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12814",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90775",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.06061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90763",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90699",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90705",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90716",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90726",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90737",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90743",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90751",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90748",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90767",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90764",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12814"
                },
                {
                    "reference_url": "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1"
                },
                {
                    "reference_url": "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1"
                },
                {
                    "reference_url": "https://rt.perl.org/Public/Bug/Display.html?id=131665",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://rt.perl.org/Public/Bug/Display.html?id=131665"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180426-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20180426-0001/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.oracle.com/security-alerts/cpujul2020.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101051",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/101051"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12814",
                    "reference_id": "CVE-2017-12814",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12814"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934728?format=api",
                    "purl": "pkg:deb/debian/perl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934721?format=api",
                    "purl": "pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r3y5-1dk2-pyfc"
                        },
                        {
                            "vulnerability": "VCID-vgg2-vymx-b3fe"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934719?format=api",
                    "purl": "pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vgg2-vymx-b3fe"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934723?format=api",
                    "purl": "pkg:deb/debian/perl@5.40.1-6?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934722?format=api",
                    "purl": "pkg:deb/debian/perl@5.40.1-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-12814"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fe7j-gxfx-1ufh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/107126?format=api",
            "vulnerability_id": "VCID-mmaj-ak8p-efcm",
            "summary": "Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.14668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94445",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.14668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94452",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.14668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9446",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.14668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94463",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.14668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94473",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.14668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94476",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.14668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9448",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.14668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94482",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.14668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94496",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.14668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.945",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.14668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94503",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.14668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94504",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0377"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934728?format=api",
                    "purl": "pkg:deb/debian/perl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934721?format=api",
                    "purl": "pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r3y5-1dk2-pyfc"
                        },
                        {
                            "vulnerability": "VCID-vgg2-vymx-b3fe"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934719?format=api",
                    "purl": "pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vgg2-vymx-b3fe"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934723?format=api",
                    "purl": "pkg:deb/debian/perl@5.40.1-6?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934722?format=api",
                    "purl": "pkg:deb/debian/perl@5.40.1-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2004-0377"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mmaj-ak8p-efcm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78139?format=api",
            "vulnerability_id": "VCID-nxx4-txsk-6ucr",
            "summary": "perl: stack-based crash in S_find_uninit_var()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48522.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48522.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48522",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.17318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9502",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.17318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95059",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.17318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95057",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.17318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9506",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.17318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95022",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.17318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95024",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.17318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95032",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.17318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95036",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.17318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95042",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.17318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95043",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.17318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95046",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.17318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95055",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48522"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234416",
                    "reference_id": "2234416",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234416"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230915-0008/",
                    "reference_id": "ntap-20230915-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:20:55Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230915-0008/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6206",
                    "reference_id": "RHSA-2026:6206",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6206"
                },
                {
                    "reference_url": "https://github.com/Perl/perl5/blob/79a7b254d85a10b65126ad99bf10e70480569d68/sv.c#L16336-L16345",
                    "reference_id": "sv.c#L16336-L16345",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-10-03T14:20:55Z/"
                        }
                    ],
                    "url": "https://github.com/Perl/perl5/blob/79a7b254d85a10b65126ad99bf10e70480569d68/sv.c#L16336-L16345"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6517-1/",
                    "reference_id": "USN-6517-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6517-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934728?format=api",
                    "purl": "pkg:deb/debian/perl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934721?format=api",
                    "purl": "pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r3y5-1dk2-pyfc"
                        },
                        {
                            "vulnerability": "VCID-vgg2-vymx-b3fe"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934767?format=api",
                    "purl": "pkg:deb/debian/perl@5.36.0-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934719?format=api",
                    "purl": "pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vgg2-vymx-b3fe"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934723?format=api",
                    "purl": "pkg:deb/debian/perl@5.40.1-6?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934722?format=api",
                    "purl": "pkg:deb/debian/perl@5.40.1-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-48522"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nxx4-txsk-6ucr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56827?format=api",
            "vulnerability_id": "VCID-pwt9-n1n8-sfew",
            "summary": "Multiple vulnerabilities were found in Perl, the worst of which\n    could allow a local attacker to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "http://bugs.gentoo.org/show_bug.cgi?id=313565",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.gentoo.org/show_bug.cgi?id=313565"
                },
                {
                    "reference_url": "http://perldoc.perl.org/perl5100delta.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://perldoc.perl.org/perl5100delta.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1158.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1158.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1158",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67415",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67295",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67332",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67355",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67383",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67396",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67417",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67405",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67371",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67406",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67418",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1158"
                },
                {
                    "reference_url": "http://secunia.com/advisories/55314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/55314"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2010/04/08/9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2010/04/08/9"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2010/04/14/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2010/04/14/3"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=580605",
                    "reference_id": "580605",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=580605"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1158",
                    "reference_id": "CVE-2010-1158",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1158"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201311-17",
                    "reference_id": "GLSA-201311-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201311-17"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934728?format=api",
                    "purl": "pkg:deb/debian/perl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934721?format=api",
                    "purl": "pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r3y5-1dk2-pyfc"
                        },
                        {
                            "vulnerability": "VCID-vgg2-vymx-b3fe"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934719?format=api",
                    "purl": "pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vgg2-vymx-b3fe"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934723?format=api",
                    "purl": "pkg:deb/debian/perl@5.40.1-6?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934722?format=api",
                    "purl": "pkg:deb/debian/perl@5.40.1-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-1158"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pwt9-n1n8-sfew"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70411?format=api",
            "vulnerability_id": "VCID-x5rc-hajz-p7gp",
            "summary": "perl: Perl 5.34, 5.36, 5.38 and 5.40 are vulnerable to a heap buffer overflow when transliterating non-ASCII bytes",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56406.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56406.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-56406",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28647",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32619",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32537",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32569",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32555",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32581",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32618",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32688",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32723",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32544",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32592",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-56406"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359290",
                    "reference_id": "2359290",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359290"
                },
                {
                    "reference_url": "https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch",
                    "reference_id": "87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-16T14:04:16Z/"
                        }
                    ],
                    "url": "https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch"
                },
                {
                    "reference_url": "https://metacpan.org/release/SHAY/perl-5.38.4/changes",
                    "reference_id": "changes",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-16T14:04:16Z/"
                        }
                    ],
                    "url": "https://metacpan.org/release/SHAY/perl-5.38.4/changes"
                },
                {
                    "reference_url": "https://metacpan.org/release/SHAY/perl-5.40.2/changes",
                    "reference_id": "changes",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-16T14:04:16Z/"
                        }
                    ],
                    "url": "https://metacpan.org/release/SHAY/perl-5.40.2/changes"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7500",
                    "reference_id": "RHSA-2025:7500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7500"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7434-1/",
                    "reference_id": "USN-7434-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7434-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7434-2/",
                    "reference_id": "USN-7434-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7434-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934728?format=api",
                    "purl": "pkg:deb/debian/perl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934721?format=api",
                    "purl": "pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r3y5-1dk2-pyfc"
                        },
                        {
                            "vulnerability": "VCID-vgg2-vymx-b3fe"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934774?format=api",
                    "purl": "pkg:deb/debian/perl@5.36.0-7%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934719?format=api",
                    "purl": "pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-vgg2-vymx-b3fe"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934775?format=api",
                    "purl": "pkg:deb/debian/perl@5.40.1-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934723?format=api",
                    "purl": "pkg:deb/debian/perl@5.40.1-6?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934722?format=api",
                    "purl": "pkg:deb/debian/perl@5.40.1-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-56406"
            ],
            "risk_score": 3.8,
            "exploitability": "0.5",
            "weighted_severity": "7.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x5rc-hajz-p7gp"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@0%3Fdistro=trixie"
}