Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-18hx-q4kf-dfb9
Vulnerability ID VCID-18hx-q4kf-dfb9
Aliases CVE-2010-1168
Summary The Safe module for Perl does not properly restrict code, allowing a remote attacker to execute arbitrary Perl code outside of a restricted compartment.
Status Published
Exploitability 0.5
Weighted Severity 6.8
Risk 3.4
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
http://blogs.perl.org/users/rafael_garcia-suarez/2010/03/new-safepm-fixes-security-hole.html
http://blogs.sun.com/security/entry/cve_2010_1168_vulnerability_in
http://cpansearch.perl.org/src/RGARCIA/Safe-2.27/Changes
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1168.json
https://api.first.org/data/v1/epss?cve=CVE-2010-1168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1168
http://secunia.com/advisories/40049
http://secunia.com/advisories/40052
http://secunia.com/advisories/42402
http://securitytracker.com/id?1024062
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7424
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9807
http://www.mandriva.com/security/advisories?name=MDVSA-2010:115
http://www.mandriva.com/security/advisories?name=MDVSA-2010:116
http://www.openwall.com/lists/oss-security/2010/05/20/5
http://www.redhat.com/support/errata/RHSA-2010-0457.html
http://www.redhat.com/support/errata/RHSA-2010-0458.html
http://www.vupen.com/english/advisories/2010/3075
576508 https://bugzilla.redhat.com/show_bug.cgi?id=576508
582978 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582978
cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*
cpe:2.3:a:rafael_garcia-suarez:safe:2.08:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rafael_garcia-suarez:safe:2.08:*:*:*:*:*:*:*
cpe:2.3:a:rafael_garcia-suarez:safe:2.09:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rafael_garcia-suarez:safe:2.09:*:*:*:*:*:*:*
cpe:2.3:a:rafael_garcia-suarez:safe:2.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rafael_garcia-suarez:safe:2.11:*:*:*:*:*:*:*
cpe:2.3:a:rafael_garcia-suarez:safe:2.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rafael_garcia-suarez:safe:2.13:*:*:*:*:*:*:*
cpe:2.3:a:rafael_garcia-suarez:safe:2.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rafael_garcia-suarez:safe:2.14:*:*:*:*:*:*:*
cpe:2.3:a:rafael_garcia-suarez:safe:2.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rafael_garcia-suarez:safe:2.15:*:*:*:*:*:*:*
cpe:2.3:a:rafael_garcia-suarez:safe:2.16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rafael_garcia-suarez:safe:2.16:*:*:*:*:*:*:*
cpe:2.3:a:rafael_garcia-suarez:safe:2.17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rafael_garcia-suarez:safe:2.17:*:*:*:*:*:*:*
cpe:2.3:a:rafael_garcia-suarez:safe:2.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rafael_garcia-suarez:safe:2.18:*:*:*:*:*:*:*
cpe:2.3:a:rafael_garcia-suarez:safe:2.19:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rafael_garcia-suarez:safe:2.19:*:*:*:*:*:*:*
cpe:2.3:a:rafael_garcia-suarez:safe:2.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rafael_garcia-suarez:safe:2.20:*:*:*:*:*:*:*
cpe:2.3:a:rafael_garcia-suarez:safe:2.21:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rafael_garcia-suarez:safe:2.21:*:*:*:*:*:*:*
cpe:2.3:a:rafael_garcia-suarez:safe:2.22:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rafael_garcia-suarez:safe:2.22:*:*:*:*:*:*:*
cpe:2.3:a:rafael_garcia-suarez:safe:2.23:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rafael_garcia-suarez:safe:2.23:*:*:*:*:*:*:*
cpe:2.3:a:rafael_garcia-suarez:safe:2.24:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rafael_garcia-suarez:safe:2.24:*:*:*:*:*:*:*
CVE-2010-1168 https://nvd.nist.gov/vuln/detail/CVE-2010-1168
GLSA-201111-09 https://security.gentoo.org/glsa/201111-09
RHSA-2010:0457 https://access.redhat.com/errata/RHSA-2010:0457
RHSA-2010:0458 https://access.redhat.com/errata/RHSA-2010:0458
USN-1129-1 https://usn.ubuntu.com/1129-1/
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2010-1168
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.89052
EPSS Score 0.04483
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:03:23.614224+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/201111-09 38.0.0