Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/perl@5.28.0-3?distro=trixie
Typedeb
Namespacedebian
Nameperl
Version5.28.0-3
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version5.28.1-1
Latest_non_vulnerable_version5.40.1-7
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-fcg3-35wj-1bbm
vulnerability_id VCID-fcg3-35wj-1bbm
summary
Multiple vulnerabilities have been found in Perl, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18314.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18314.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18314
reference_id
reference_type
scores
0
value 0.05205
scoring_system epss
scoring_elements 0.89891
published_at 2026-04-01T12:55:00Z
1
value 0.05205
scoring_system epss
scoring_elements 0.89895
published_at 2026-04-02T12:55:00Z
2
value 0.05205
scoring_system epss
scoring_elements 0.89907
published_at 2026-04-04T12:55:00Z
3
value 0.05205
scoring_system epss
scoring_elements 0.89912
published_at 2026-04-07T12:55:00Z
4
value 0.05205
scoring_system epss
scoring_elements 0.89929
published_at 2026-04-08T12:55:00Z
5
value 0.05205
scoring_system epss
scoring_elements 0.89934
published_at 2026-04-09T12:55:00Z
6
value 0.05205
scoring_system epss
scoring_elements 0.89942
published_at 2026-04-11T12:55:00Z
7
value 0.05205
scoring_system epss
scoring_elements 0.8994
published_at 2026-04-12T12:55:00Z
8
value 0.05205
scoring_system epss
scoring_elements 0.89933
published_at 2026-04-13T12:55:00Z
9
value 0.05205
scoring_system epss
scoring_elements 0.89948
published_at 2026-04-16T12:55:00Z
10
value 0.05205
scoring_system epss
scoring_elements 0.8995
published_at 2026-04-18T12:55:00Z
11
value 0.05205
scoring_system epss
scoring_elements 0.89944
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18314
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1646751
reference_id 1646751
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1646751
8
reference_url https://security.gentoo.org/glsa/201909-01
reference_id GLSA-201909-01
reference_type
scores
url https://security.gentoo.org/glsa/201909-01
9
reference_url https://access.redhat.com/errata/RHSA-2019:0001
reference_id RHSA-2019:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0001
10
reference_url https://access.redhat.com/errata/RHSA-2019:0010
reference_id RHSA-2019:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0010
11
reference_url https://usn.ubuntu.com/3834-1/
reference_id USN-3834-1
reference_type
scores
url https://usn.ubuntu.com/3834-1/
fixed_packages
0
url pkg:deb/debian/perl@5.28.0-3?distro=trixie
purl pkg:deb/debian/perl@5.28.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.0-3%3Fdistro=trixie
1
url pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-r3y5-1dk2-pyfc
1
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/perl@5.40.1-6?distro=trixie
purl pkg:deb/debian/perl@5.40.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie
4
url pkg:deb/debian/perl@5.40.1-7?distro=trixie
purl pkg:deb/debian/perl@5.40.1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie
aliases CVE-2018-18314
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fcg3-35wj-1bbm
1
url VCID-p9gy-p1x1-ayfw
vulnerability_id VCID-p9gy-p1x1-ayfw
summary
Multiple vulnerabilities have been found in Perl, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18313.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18313.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18313
reference_id
reference_type
scores
0
value 0.0414
scoring_system epss
scoring_elements 0.88602
published_at 2026-04-01T12:55:00Z
1
value 0.0414
scoring_system epss
scoring_elements 0.88611
published_at 2026-04-02T12:55:00Z
2
value 0.0414
scoring_system epss
scoring_elements 0.88627
published_at 2026-04-04T12:55:00Z
3
value 0.0414
scoring_system epss
scoring_elements 0.88629
published_at 2026-04-07T12:55:00Z
4
value 0.0414
scoring_system epss
scoring_elements 0.88647
published_at 2026-04-08T12:55:00Z
5
value 0.0414
scoring_system epss
scoring_elements 0.88652
published_at 2026-04-09T12:55:00Z
6
value 0.0414
scoring_system epss
scoring_elements 0.88664
published_at 2026-04-11T12:55:00Z
7
value 0.0414
scoring_system epss
scoring_elements 0.88657
published_at 2026-04-13T12:55:00Z
8
value 0.0414
scoring_system epss
scoring_elements 0.8867
published_at 2026-04-16T12:55:00Z
9
value 0.0414
scoring_system epss
scoring_elements 0.88667
published_at 2026-04-18T12:55:00Z
10
value 0.0414
scoring_system epss
scoring_elements 0.88665
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18313
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1646738
reference_id 1646738
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1646738
8
reference_url https://security.gentoo.org/glsa/201909-01
reference_id GLSA-201909-01
reference_type
scores
url https://security.gentoo.org/glsa/201909-01
9
reference_url https://access.redhat.com/errata/RHSA-2019:0001
reference_id RHSA-2019:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0001
10
reference_url https://access.redhat.com/errata/RHSA-2019:0010
reference_id RHSA-2019:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0010
11
reference_url https://usn.ubuntu.com/3834-1/
reference_id USN-3834-1
reference_type
scores
url https://usn.ubuntu.com/3834-1/
12
reference_url https://usn.ubuntu.com/3834-2/
reference_id USN-3834-2
reference_type
scores
url https://usn.ubuntu.com/3834-2/
fixed_packages
0
url pkg:deb/debian/perl@5.28.0-3?distro=trixie
purl pkg:deb/debian/perl@5.28.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.0-3%3Fdistro=trixie
1
url pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-r3y5-1dk2-pyfc
1
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/perl@5.40.1-6?distro=trixie
purl pkg:deb/debian/perl@5.40.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie
4
url pkg:deb/debian/perl@5.40.1-7?distro=trixie
purl pkg:deb/debian/perl@5.40.1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie
aliases CVE-2018-18313
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p9gy-p1x1-ayfw
2
url VCID-yq1q-x52j-w7at
vulnerability_id VCID-yq1q-x52j-w7at
summary
Storable versions before 3.05 for Perl has a stack overflow.

The retrieve_hook function stored the length of the class name into a signed integer but in read operations treated the length as unsigned. This allowed an attacker to craft data that could trigger the overflow.
references
0
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-20230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-20230
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://github.com/Perl/perl5/issues/15831
reference_id 15831
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-21T16:28:22Z/
url https://github.com/Perl/perl5/issues/15831
3
reference_url https://github.com/Perl/perl5/commit/a258c17c6937f79529c8319a829310e09cdbd216.patch
reference_id a258c17c6937f79529c8319a829310e09cdbd216.patch
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-21T16:28:22Z/
url https://github.com/Perl/perl5/commit/a258c17c6937f79529c8319a829310e09cdbd216.patch
4
reference_url https://metacpan.org/release/RURBAN/Storable-3.05/changes
reference_id changes
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-21T16:28:22Z/
url https://metacpan.org/release/RURBAN/Storable-3.05/changes
5
reference_url https://www.nntp.perl.org/group/perl.perl5.porters/2017/01/msg242533.html
reference_id msg242533.html
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-21T16:28:22Z/
url https://www.nntp.perl.org/group/perl.perl5.porters/2017/01/msg242533.html
6
reference_url https://www.nntp.perl.org/group/perl.perl5.porters/2017/01/msg242703.html
reference_id msg242703.html
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-21T16:28:22Z/
url https://www.nntp.perl.org/group/perl.perl5.porters/2017/01/msg242703.html
fixed_packages
0
url pkg:deb/debian/perl@5.28.0-3?distro=trixie
purl pkg:deb/debian/perl@5.28.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.0-3%3Fdistro=trixie
1
url pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-r3y5-1dk2-pyfc
1
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vgg2-vymx-b3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/perl@5.40.1-6?distro=trixie
purl pkg:deb/debian/perl@5.40.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-6%3Fdistro=trixie
4
url pkg:deb/debian/perl@5.40.1-7?distro=trixie
purl pkg:deb/debian/perl@5.40.1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.40.1-7%3Fdistro=trixie
aliases CVE-2017-20230
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yq1q-x52j-w7at
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.0-3%3Fdistro=trixie