{"url":"http://public2.vulnerablecode.io/api/packages/1037017?format=json","purl":"pkg:deb/debian/perl@5.24.1-3%2Bdeb9u7","type":"deb","namespace":"debian","name":"perl","version":"5.24.1-3+deb9u7","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"5.40.1-6","latest_non_vulnerable_version":"5.40.1-6","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63887?format=json","vulnerability_id":"VCID-9ff8-ad5m-dbfb","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12837.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12837.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12837","reference_id":"","reference_type":"","scores":[{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86876","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.87077","published_at":"2026-05-16T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.87024","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.87038","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.8707","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.87076","published_at":"2026-05-15T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86886","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86905","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86898","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86919","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86927","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.8694","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86935","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.8693","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86945","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86949","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86948","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86965","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86971","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86973","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86994","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.87011","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.87029","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12883"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:N/A:N"},{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://perl5.git.perl.org/perl.git/commitdiff/96c83ed78aeea1a0496dd2b2d935869a822dc8a5","reference_id":"","reference_type":"","scores":[],"url":"https://perl5.git.perl.org/perl.git/commitdiff/96c83ed78aeea1a0496dd2b2d935869a822dc8a5"},{"reference_url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1","reference_id":"","reference_type":"","scores":[],"url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1"},{"reference_url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1","reference_id":"","reference_type":"","scores":[],"url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1"},{"reference_url":"https://rt.perl.org/Public/Bug/Display.html?id=131582","reference_id":"","reference_type":"","scores":[],"url":"https://rt.perl.org/Public/Bug/Display.html?id=131582"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180426-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20180426-0001/"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3982","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3982"},{"reference_url":"http://www.securityfocus.com/bid/100860","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/100860"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1492091","reference_id":"1492091","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1492091"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875596","reference_id":"875596","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875596"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12837","reference_id":"CVE-2017-12837","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6206","reference_id":"RHSA-2026:6206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6206"},{"reference_url":"https://usn.ubuntu.com/3478-1/","reference_id":"USN-3478-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3478-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2017-12837"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9ff8-ad5m-dbfb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47707?format=json","vulnerability_id":"VCID-a1cw-hg74-v3c3","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10878.json","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10878.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10878","reference_id":"","reference_type":"","scores":[{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28925","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2899","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.29033","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.29037","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28993","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28943","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28986","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.29113","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.29062","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29039","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2906","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29141","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2915","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29154","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29551","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29524","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29478","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29365","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29251","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29186","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29041","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29101","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29115","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10878"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1837988","reference_id":"1837988","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1837988"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962005","reference_id":"962005","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962005"},{"reference_url":"https://security.gentoo.org/glsa/202006-03","reference_id":"GLSA-202006-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202006-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0343","reference_id":"RHSA-2021:0343","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0883","reference_id":"RHSA-2021:0883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1032","reference_id":"RHSA-2021:1032","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1032"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1266","reference_id":"RHSA-2021:1266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1678","reference_id":"RHSA-2021:1678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2792","reference_id":"RHSA-2021:2792","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2792"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7604","reference_id":"RHSA-2026:7604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7604"},{"reference_url":"https://usn.ubuntu.com/4602-1/","reference_id":"USN-4602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4602-1/"},{"reference_url":"https://usn.ubuntu.com/4602-2/","reference_id":"USN-4602-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4602-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994892?format=json","purl":"pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-vgg2-vymx-b3fe"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3"}],"aliases":["CVE-2020-10878"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a1cw-hg74-v3c3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59315?format=json","vulnerability_id":"VCID-efz8-y2qe-dkgj","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18311.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18311.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18311","reference_id":"","reference_type":"","scores":[{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93514","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93523","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93531","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.9353","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93539","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93542","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93548","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93547","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93567","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93573","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93579","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93583","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93582","published_at":"2026-04-26T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.9358","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93587","published_at":"2026-05-05T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93601","published_at":"2026-05-07T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93611","published_at":"2026-05-09T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93612","published_at":"2026-05-11T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93618","published_at":"2026-05-12T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93631","published_at":"2026-05-16T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93637","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646730","reference_id":"1646730","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646730"},{"reference_url":"https://security.gentoo.org/glsa/201909-01","reference_id":"GLSA-201909-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201909-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0001","reference_id":"RHSA-2019:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0010","reference_id":"RHSA-2019:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0109","reference_id":"RHSA-2019:0109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1790","reference_id":"RHSA-2019:1790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1942","reference_id":"RHSA-2019:1942","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1942"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2400","reference_id":"RHSA-2019:2400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2400"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7604","reference_id":"RHSA-2026:7604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7604"},{"reference_url":"https://usn.ubuntu.com/3834-1/","reference_id":"USN-3834-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3834-1/"},{"reference_url":"https://usn.ubuntu.com/3834-2/","reference_id":"USN-3834-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3834-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2018-18311"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-efz8-y2qe-dkgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59318?format=json","vulnerability_id":"VCID-fcg3-35wj-1bbm","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18314.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18314.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18314","reference_id":"","reference_type":"","scores":[{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89891","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89907","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89912","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89929","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89934","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89942","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.8994","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89933","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89948","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.8995","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89944","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89961","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.8996","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89958","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89972","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89987","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89999","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89994","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.90002","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.90017","published_at":"2026-05-14T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.90025","published_at":"2026-05-15T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.90026","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646751","reference_id":"1646751","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646751"},{"reference_url":"https://security.gentoo.org/glsa/201909-01","reference_id":"GLSA-201909-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201909-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0001","reference_id":"RHSA-2019:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0010","reference_id":"RHSA-2019:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7604","reference_id":"RHSA-2026:7604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7604"},{"reference_url":"https://usn.ubuntu.com/3834-1/","reference_id":"USN-3834-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3834-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2018-18314"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fcg3-35wj-1bbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59320?format=json","vulnerability_id":"VCID-h9m2-nyf7-17et","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6798.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6798.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6798","reference_id":"","reference_type":"","scores":[{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81649","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.8166","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81682","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.8168","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81707","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81711","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81731","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81719","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81712","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.8175","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81754","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81777","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81787","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81793","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.8181","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81831","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81856","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81853","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.8187","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81911","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81919","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6798"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547779","reference_id":"1547779","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547779"},{"reference_url":"https://security.gentoo.org/glsa/201909-01","reference_id":"GLSA-201909-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201909-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1192","reference_id":"RHSA-2018:1192","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1192"},{"reference_url":"https://usn.ubuntu.com/3625-1/","reference_id":"USN-3625-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3625-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2018-6798"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h9m2-nyf7-17et"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48233?format=json","vulnerability_id":"VCID-hf7c-n8hb-q7dk","summary":"Multiple vulnerabilities have been discovered in Perl, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36770.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36770.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-36770","reference_id":"","reference_type":"","scores":[{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26076","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.2608","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29449","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29262","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29327","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29367","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.2937","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29324","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29271","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29296","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.28894","published_at":"2026-05-16T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29329","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.294","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.28777","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.28796","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.28877","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.28889","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29404","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29471","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29329","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29391","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-36770"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36770","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36770"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1983786","reference_id":"1983786","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1983786"},{"reference_url":"https://security.archlinux.org/AVG-2264","reference_id":"AVG-2264","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2264"},{"reference_url":"https://security.gentoo.org/glsa/202411-09","reference_id":"GLSA-202411-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202411-09"},{"reference_url":"https://usn.ubuntu.com/5033-1/","reference_id":"USN-5033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5033-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994892?format=json","purl":"pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-vgg2-vymx-b3fe"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3"}],"aliases":["CVE-2021-36770"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hf7c-n8hb-q7dk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63888?format=json","vulnerability_id":"VCID-hyw2-vhpu-uya2","summary":"security update","references":[{"reference_url":"http://mirror.cucumberlinux.com/cucumber/cucumber-1.0/source/lang-base/perl/patches/CVE-2017-12883.patch","reference_id":"","reference_type":"","scores":[],"url":"http://mirror.cucumberlinux.com/cucumber/cucumber-1.0/source/lang-base/perl/patches/CVE-2017-12883.patch"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12883.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12883.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12883","reference_id":"","reference_type":"","scores":[{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89053","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89107","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89062","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89077","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89079","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89097","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89102","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89113","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89109","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89121","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89448","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89478","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89489","published_at":"2026-05-15T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89406","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89408","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89417","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89435","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89458","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89488","published_at":"2026-05-16T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89387","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89384","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89401","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12883"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:P"},{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300f#patch1","reference_id":"","reference_type":"","scores":[],"url":"https://perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300f#patch1"},{"reference_url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1","reference_id":"","reference_type":"","scores":[],"url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1"},{"reference_url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1","reference_id":"","reference_type":"","scores":[],"url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1"},{"reference_url":"https://rt.perl.org/Public/Bug/Display.html?id=131598","reference_id":"","reference_type":"","scores":[],"url":"https://rt.perl.org/Public/Bug/Display.html?id=131598"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180426-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20180426-0001/"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3982","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3982"},{"reference_url":"http://www.securityfocus.com/bid/100852","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/100852"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1492093","reference_id":"1492093","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1492093"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875597","reference_id":"875597","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875597"},{"reference_url":"https://security.archlinux.org/AVG-500","reference_id":"AVG-500","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-500"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12883","reference_id":"CVE-2017-12883","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:P"},{"value":"9.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6206","reference_id":"RHSA-2026:6206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6206"},{"reference_url":"https://usn.ubuntu.com/3478-1/","reference_id":"USN-3478-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3478-1/"},{"reference_url":"https://usn.ubuntu.com/3478-2/","reference_id":"USN-3478-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3478-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2017-12883"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hyw2-vhpu-uya2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59319?format=json","vulnerability_id":"VCID-kc81-vy1w-gfdz","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6797.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6797.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6797","reference_id":"","reference_type":"","scores":[{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80898","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80907","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.8093","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80927","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80955","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80962","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80978","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80965","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80956","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80993","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80995","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.81016","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.81025","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.81032","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.81047","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.81069","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.8109","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.81086","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.81104","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.81145","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.81149","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.81153","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6797"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547783","reference_id":"1547783","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547783"},{"reference_url":"https://security.gentoo.org/glsa/201909-01","reference_id":"GLSA-201909-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201909-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1192","reference_id":"RHSA-2018:1192","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1192"},{"reference_url":"https://usn.ubuntu.com/3625-1/","reference_id":"USN-3625-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3625-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2018-6797"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kc81-vy1w-gfdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78456?format=json","vulnerability_id":"VCID-kcy1-7ny3-sufc","summary":"perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31484.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31484.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-31484","reference_id":"","reference_type":"","scores":[{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78776","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78844","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78893","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78877","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.7887","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78842","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78808","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.7879","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78816","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78822","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78845","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78828","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78819","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78847","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01314","scoring_system":"epss","scoring_elements":"0.79964","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01314","scoring_system":"epss","scoring_elements":"0.79926","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01314","scoring_system":"epss","scoring_elements":"0.80021","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01314","scoring_system":"epss","scoring_elements":"0.80016","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01314","scoring_system":"epss","scoring_elements":"0.79978","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01314","scoring_system":"epss","scoring_elements":"0.79961","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01314","scoring_system":"epss","scoring_elements":"0.79949","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01523","scoring_system":"epss","scoring_elements":"0.81458","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-31484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31484"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/04/29/1","reference_id":"1","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-12T15:22:37Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/04/29/1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035109","reference_id":"1035109","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035109"},{"reference_url":"https://www.openwall.com/lists/oss-security/2023/04/18/14","reference_id":"14","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-12T15:22:37Z/"}],"url":"https://www.openwall.com/lists/oss-security/2023/04/18/14"},{"reference_url":"https://github.com/andk/cpanpm/pull/175","reference_id":"175","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-12T15:22:37Z/"}],"url":"https://github.com/andk/cpanpm/pull/175"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/05/07/2","reference_id":"2","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-12T15:22:37Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/05/07/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218667","reference_id":"2218667","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218667"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/05/03/3","reference_id":"3","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-12T15:22:37Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/05/03/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/05/03/5","reference_id":"5","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-12T15:22:37Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/05/03/5"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/","reference_id":"BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-12T15:22:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/"},{"reference_url":"https://metacpan.org/dist/CPAN/changes","reference_id":"changes","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-12T15:22:37Z/"}],"url":"https://metacpan.org/dist/CPAN/changes"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/","reference_id":"LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-12T15:22:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240621-0007/","reference_id":"ntap-20240621-0007","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-12T15:22:37Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240621-0007/"},{"reference_url":"https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/","reference_id":"perl-http-tiny-insecure-tls-default-affects-cpan-modules","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-12T15:22:37Z/"}],"url":"https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6539","reference_id":"RHSA-2023:6539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3094","reference_id":"RHSA-2024:3094","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3094"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0079","reference_id":"RHSA-2026:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7604","reference_id":"RHSA-2026:7604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7604"},{"reference_url":"https://usn.ubuntu.com/6112-1/","reference_id":"USN-6112-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6112-1/"},{"reference_url":"https://usn.ubuntu.com/6112-2/","reference_id":"USN-6112-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6112-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994893?format=json","purl":"pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-vgg2-vymx-b3fe"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3"}],"aliases":["CVE-2023-31484"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kcy1-7ny3-sufc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47708?format=json","vulnerability_id":"VCID-kw8t-k4h2-cbcd","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12723.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12723.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12723","reference_id":"","reference_type":"","scores":[{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40876","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40957","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40986","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40912","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40961","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40968","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40987","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40952","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40934","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40976","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40946","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40867","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40774","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40761","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40677","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40529","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40598","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40615","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40521","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40546","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.4062","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40633","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40656","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1838000","reference_id":"1838000","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1838000"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962005","reference_id":"962005","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962005"},{"reference_url":"https://security.gentoo.org/glsa/202006-03","reference_id":"GLSA-202006-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202006-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0343","reference_id":"RHSA-2021:0343","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0557","reference_id":"RHSA-2021:0557","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0883","reference_id":"RHSA-2021:0883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1032","reference_id":"RHSA-2021:1032","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1032"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1266","reference_id":"RHSA-2021:1266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2184","reference_id":"RHSA-2021:2184","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2184"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7604","reference_id":"RHSA-2026:7604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7604"},{"reference_url":"https://usn.ubuntu.com/4602-1/","reference_id":"USN-4602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4602-1/"},{"reference_url":"https://usn.ubuntu.com/4602-2/","reference_id":"USN-4602-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4602-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994892?format=json","purl":"pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-vgg2-vymx-b3fe"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3"}],"aliases":["CVE-2020-12723"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kw8t-k4h2-cbcd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47706?format=json","vulnerability_id":"VCID-ns9e-t4zg-r3b6","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10543.json","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10543.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10543","reference_id":"","reference_type":"","scores":[{"value":"0.03241","scoring_system":"epss","scoring_elements":"0.87103","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03241","scoring_system":"epss","scoring_elements":"0.87116","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03241","scoring_system":"epss","scoring_elements":"0.87052","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03241","scoring_system":"epss","scoring_elements":"0.87063","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03241","scoring_system":"epss","scoring_elements":"0.87082","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03241","scoring_system":"epss","scoring_elements":"0.87096","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03241","scoring_system":"epss","scoring_elements":"0.87075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.88918","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.8893","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.88924","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.88933","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.88952","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.88963","published_at":"2026-05-15T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.88961","published_at":"2026-05-16T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.8886","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.88873","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.88871","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.88869","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.88886","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.88893","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.88901","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1837975","reference_id":"1837975","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1837975"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962005","reference_id":"962005","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962005"},{"reference_url":"https://security.gentoo.org/glsa/202006-03","reference_id":"GLSA-202006-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202006-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0343","reference_id":"RHSA-2021:0343","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0883","reference_id":"RHSA-2021:0883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1032","reference_id":"RHSA-2021:1032","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1032"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1266","reference_id":"RHSA-2021:1266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1678","reference_id":"RHSA-2021:1678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2792","reference_id":"RHSA-2021:2792","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2792"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6206","reference_id":"RHSA-2026:6206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6206"},{"reference_url":"https://usn.ubuntu.com/4602-1/","reference_id":"USN-4602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4602-1/"},{"reference_url":"https://usn.ubuntu.com/4602-2/","reference_id":"USN-4602-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4602-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994892?format=json","purl":"pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-vgg2-vymx-b3fe"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3"}],"aliases":["CVE-2020-10543"],"risk_score":3.7,"exploitability":"0.5","weighted_severity":"7.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ns9e-t4zg-r3b6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59317?format=json","vulnerability_id":"VCID-p9gy-p1x1-ayfw","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18313.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18313.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18313","reference_id":"","reference_type":"","scores":[{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88602","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88611","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88627","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88629","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88647","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88652","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88664","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88657","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.8867","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88667","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88665","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.8868","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88686","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88685","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88696","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88712","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88725","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88722","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88733","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88757","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88767","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88766","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646738","reference_id":"1646738","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646738"},{"reference_url":"https://security.gentoo.org/glsa/201909-01","reference_id":"GLSA-201909-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201909-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0001","reference_id":"RHSA-2019:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0010","reference_id":"RHSA-2019:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7604","reference_id":"RHSA-2026:7604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7604"},{"reference_url":"https://usn.ubuntu.com/3834-1/","reference_id":"USN-3834-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3834-1/"},{"reference_url":"https://usn.ubuntu.com/3834-2/","reference_id":"USN-3834-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3834-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2018-18313"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p9gy-p1x1-ayfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69473?format=json","vulnerability_id":"VCID-r3y5-1dk2-pyfc","summary":"perl: Perl threads have a working directory race condition where file operations may target unintended paths","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40909.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40909.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40909","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09645","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09788","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12572","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12617","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12659","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1247","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12549","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12599","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12566","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12525","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12487","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1239","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12517","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12483","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12368","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12277","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12413","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12478","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12475","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.125","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40909"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40909","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40909"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/Perl/perl5/issues/10387","reference_id":"10387","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T14:05:00Z/"}],"url":"https://github.com/Perl/perl5/issues/10387"},{"reference_url":"https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e","reference_id":"11a11ecf4bea72b17d250cfb43c897be1341861e","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T14:05:00Z/"}],"url":"https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e"},{"reference_url":"https://www.openwall.com/lists/oss-security/2025/05/22/2","reference_id":"2","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T14:05:00Z/"}],"url":"https://www.openwall.com/lists/oss-security/2025/05/22/2"},{"reference_url":"https://github.com/Perl/perl5/issues/23010","reference_id":"23010","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T14:05:00Z/"}],"url":"https://github.com/Perl/perl5/issues/23010"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369407","reference_id":"2369407","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369407"},{"reference_url":"https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch","reference_id":"918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T14:05:00Z/"}],"url":"https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch"},{"reference_url":"https://security.archlinux.org/AVG-2890","reference_id":"AVG-2890","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2890"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226","reference_id":"bugreport.cgi?bug=1098226","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T14:05:00Z/"}],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226"},{"reference_url":"https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads","reference_id":"perl5136delta#Directory-handles-not-copied-to-threads","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T14:05:00Z/"}],"url":"https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11545","reference_id":"RHSA-2025:11545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11804","reference_id":"RHSA-2025:11804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11804"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11805","reference_id":"RHSA-2025:11805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12056","reference_id":"RHSA-2025:12056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13267","reference_id":"RHSA-2025:13267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8096","reference_id":"RHSA-2026:8096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8096"},{"reference_url":"https://usn.ubuntu.com/7678-1/","reference_id":"USN-7678-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7678-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994893?format=json","purl":"pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-vgg2-vymx-b3fe"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3"}],"aliases":["CVE-2025-40909"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r3y5-1dk2-pyfc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73643?format=json","vulnerability_id":"VCID-tkh2-ctmb-q7fm","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12015.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12015.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12015","reference_id":"","reference_type":"","scores":[{"value":"0.15065","scoring_system":"epss","scoring_elements":"0.94546","published_at":"2026-04-02T12:55:00Z"},{"value":"0.15065","scoring_system":"epss","scoring_elements":"0.94539","published_at":"2026-04-01T12:55:00Z"},{"value":"0.15065","scoring_system":"epss","scoring_elements":"0.94554","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94852","published_at":"2026-05-16T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94836","published_at":"2026-05-12T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94847","published_at":"2026-05-14T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.9485","published_at":"2026-05-15T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94761","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.9477","published_at":"2026-04-08T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94774","published_at":"2026-04-09T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94782","published_at":"2026-04-12T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94783","published_at":"2026-04-13T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.9479","published_at":"2026-04-16T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94794","published_at":"2026-04-18T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94796","published_at":"2026-04-21T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94797","published_at":"2026-04-24T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94798","published_at":"2026-04-26T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.948","published_at":"2026-04-29T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94808","published_at":"2026-05-05T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94815","published_at":"2026-05-07T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94825","published_at":"2026-05-09T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94831","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12015"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900834","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900834"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12015","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12015"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Mar/49","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Mar/49"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://seclists.org/bugtraq/2019/Mar/42","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Mar/42"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180927-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20180927-0001/"},{"reference_url":"https://support.apple.com/kb/HT209600","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209600"},{"reference_url":"https://www.debian.org/security/2018/dsa-4226","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4226"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"http://www.securityfocus.com/bid/104423","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104423"},{"reference_url":"http://www.securitytracker.com/id/1041048","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1041048"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1588760","reference_id":"1588760","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1588760"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:archive\\:\\:tar_project:archive\\:\\:tar:*:*:*:*:*:perl:*:*","reference_id":"cpe:2.3:a:archive\\:\\:tar_project:archive\\:\\:tar:*:*:*:*:*:perl:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:archive\\:\\:tar_project:archive\\:\\:tar:*:*:*:*:*:perl:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapdrive:-:*:*:*:*:unix:*:*","reference_id":"cpe:2.3:a:netapp:snapdrive:-:*:*:*:*:unix:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapdrive:-:*:*:*:*:unix:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-12015","reference_id":"CVE-2018-12015","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-12015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2097","reference_id":"RHSA-2019:2097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7604","reference_id":"RHSA-2026:7604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7604"},{"reference_url":"https://usn.ubuntu.com/3684-1/","reference_id":"USN-3684-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3684-1/"},{"reference_url":"https://usn.ubuntu.com/3684-2/","reference_id":"USN-3684-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3684-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2018-12015"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tkh2-ctmb-q7fm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59316?format=json","vulnerability_id":"VCID-vbkg-c84e-g3dx","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18312.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18312.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18312","reference_id":"","reference_type":"","scores":[{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.9334","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93349","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93356","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93355","published_at":"2026-04-07T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93363","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93367","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93372","published_at":"2026-04-13T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93371","published_at":"2026-04-12T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.9339","published_at":"2026-04-16T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93395","published_at":"2026-04-18T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93401","published_at":"2026-04-26T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93404","published_at":"2026-04-24T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.934","published_at":"2026-04-29T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93406","published_at":"2026-05-05T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93418","published_at":"2026-05-07T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93429","published_at":"2026-05-11T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93435","published_at":"2026-05-12T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93449","published_at":"2026-05-16T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93455","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646734","reference_id":"1646734","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646734"},{"reference_url":"https://security.gentoo.org/glsa/201909-01","reference_id":"GLSA-201909-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201909-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0001","reference_id":"RHSA-2019:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0010","reference_id":"RHSA-2019:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7604","reference_id":"RHSA-2026:7604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7604"},{"reference_url":"https://usn.ubuntu.com/3834-1/","reference_id":"USN-3834-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3834-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2018-18312"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vbkg-c84e-g3dx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79904?format=json","vulnerability_id":"VCID-vdc9-td4x-qkek","summary":"perl-CPAN: Bypass of verification of signatures in CHECKSUMS files","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16156.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16156.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16156","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05491","published_at":"2026-05-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05372","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05417","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05461","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05473","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05477","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0548","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05721","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05725","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05718","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05712","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05667","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05677","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05826","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05858","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05894","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05904","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05615","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05681","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05747","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05649","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05689","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16156"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015985","reference_id":"1015985","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015985"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2035273","reference_id":"2035273","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2035273"},{"reference_url":"https://security.archlinux.org/AVG-2630","reference_id":"AVG-2630","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8432","reference_id":"RHSA-2025:8432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8432"},{"reference_url":"https://usn.ubuntu.com/5689-1/","reference_id":"USN-5689-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5689-1/"},{"reference_url":"https://usn.ubuntu.com/5689-2/","reference_id":"USN-5689-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5689-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994893?format=json","purl":"pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-vgg2-vymx-b3fe"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3"}],"aliases":["CVE-2020-16156"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vdc9-td4x-qkek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59321?format=json","vulnerability_id":"VCID-xm1g-4mbg-cud5","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6913.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6913.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6913","reference_id":"","reference_type":"","scores":[{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88218","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88226","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88241","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88246","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88265","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88271","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88283","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88274","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88288","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88286","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88285","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88303","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88308","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88311","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88322","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88338","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.8835","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88347","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.8836","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88388","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88396","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6913"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6913"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547772","reference_id":"1547772","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547772"},{"reference_url":"https://security.gentoo.org/glsa/201909-01","reference_id":"GLSA-201909-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201909-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6206","reference_id":"RHSA-2026:6206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6206"},{"reference_url":"https://usn.ubuntu.com/3625-1/","reference_id":"USN-3625-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3625-1/"},{"reference_url":"https://usn.ubuntu.com/3625-2/","reference_id":"USN-3625-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3625-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2018-6913"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xm1g-4mbg-cud5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/353910?format=json","vulnerability_id":"VCID-yq1q-x52j-w7at","summary":"Storable versions before 3.05 for Perl has a stack overflow.\n\nThe retrieve_hook function stored the length of the class name into a signed integer but in read operations treated the length as unsigned. This allowed an attacker to craft data that could trigger the overflow.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-20230.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-20230.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-20230","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07148","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07143","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09996","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09754","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.0967","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09838","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09906","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09881","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.0992","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09982","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09977","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-20230"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-20230","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-20230"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/Perl/perl5/issues/15831","reference_id":"15831","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-21T16:28:22Z/"}],"url":"https://github.com/Perl/perl5/issues/15831"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2460147","reference_id":"2460147","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2460147"},{"reference_url":"https://github.com/Perl/perl5/commit/a258c17c6937f79529c8319a829310e09cdbd216.patch","reference_id":"a258c17c6937f79529c8319a829310e09cdbd216.patch","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-21T16:28:22Z/"}],"url":"https://github.com/Perl/perl5/commit/a258c17c6937f79529c8319a829310e09cdbd216.patch"},{"reference_url":"https://metacpan.org/release/RURBAN/Storable-3.05/changes","reference_id":"changes","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-21T16:28:22Z/"}],"url":"https://metacpan.org/release/RURBAN/Storable-3.05/changes"},{"reference_url":"https://www.nntp.perl.org/group/perl.perl5.porters/2017/01/msg242533.html","reference_id":"msg242533.html","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-21T16:28:22Z/"}],"url":"https://www.nntp.perl.org/group/perl.perl5.porters/2017/01/msg242533.html"},{"reference_url":"https://www.nntp.perl.org/group/perl.perl5.porters/2017/01/msg242703.html","reference_id":"msg242703.html","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-21T16:28:22Z/"}],"url":"https://www.nntp.perl.org/group/perl.perl5.porters/2017/01/msg242703.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7578","reference_id":"RHSA-2026:7578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7578"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2017-20230"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yq1q-x52j-w7at"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48236?format=json","vulnerability_id":"VCID-ysjv-efv9-xke8","summary":"Multiple vulnerabilities have been discovered in Perl, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-47038.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-47038.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-47038","reference_id":"","reference_type":"","scores":[{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28564","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29084","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28988","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28966","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28921","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28801","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28689","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28468","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28489","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28565","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.2858","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29136","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28947","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29011","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29054","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29058","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29013","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28964","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.28989","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29006","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29074","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.28926","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-47038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47038"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2249523","reference_id":"2249523","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T20:34:17Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2249523"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746","reference_id":"bugreport.cgi?bug=1056746","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T20:34:17Z/"}],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-47038","reference_id":"CVE-2023-47038","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T20:34:17Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-47038"},{"reference_url":"https://security.gentoo.org/glsa/202411-09","reference_id":"GLSA-202411-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202411-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2228","reference_id":"RHSA-2024:2228","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T20:34:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3128","reference_id":"RHSA-2024:3128","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T20:34:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:3128"},{"reference_url":"https://usn.ubuntu.com/6517-1/","reference_id":"USN-6517-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6517-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994892?format=json","purl":"pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-vgg2-vymx-b3fe"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3"}],"aliases":["CVE-2023-47038"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ysjv-efv9-xke8"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48380?format=json","vulnerability_id":"VCID-2tv2-wp3x-xbbu","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html"},{"reference_url":"http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5","reference_id":"","reference_type":"","scores":[],"url":"http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8853.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8853.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8853","reference_id":"","reference_type":"","scores":[{"value":"0.1399","scoring_system":"epss","scoring_elements":"0.94407","published_at":"2026-05-16T12:55:00Z"},{"value":"0.1399","scoring_system":"epss","scoring_elements":"0.94408","published_at":"2026-05-14T12:55:00Z"},{"value":"0.1399","scoring_system":"epss","scoring_elements":"0.94411","published_at":"2026-05-15T12:55:00Z"},{"value":"0.1399","scoring_system":"epss","scoring_elements":"0.94294","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1399","scoring_system":"epss","scoring_elements":"0.94303","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1399","scoring_system":"epss","scoring_elements":"0.94314","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1399","scoring_system":"epss","scoring_elements":"0.94316","published_at":"2026-04-07T12:55:00Z"},{"value":"0.1399","scoring_system":"epss","scoring_elements":"0.94325","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1399","scoring_system":"epss","scoring_elements":"0.9433","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1399","scoring_system":"epss","scoring_elements":"0.94333","published_at":"2026-04-12T12:55:00Z"},{"value":"0.1399","scoring_system":"epss","scoring_elements":"0.94335","published_at":"2026-04-13T12:55:00Z"},{"value":"0.1399","scoring_system":"epss","scoring_elements":"0.9435","published_at":"2026-04-16T12:55:00Z"},{"value":"0.1399","scoring_system":"epss","scoring_elements":"0.94355","published_at":"2026-04-29T12:55:00Z"},{"value":"0.1399","scoring_system":"epss","scoring_elements":"0.94357","published_at":"2026-04-26T12:55:00Z"},{"value":"0.1399","scoring_system":"epss","scoring_elements":"0.9436","published_at":"2026-05-05T12:55:00Z"},{"value":"0.1399","scoring_system":"epss","scoring_elements":"0.94369","published_at":"2026-05-07T12:55:00Z"},{"value":"0.1399","scoring_system":"epss","scoring_elements":"0.94381","published_at":"2026-05-09T12:55:00Z"},{"value":"0.1399","scoring_system":"epss","scoring_elements":"0.94389","published_at":"2026-05-11T12:55:00Z"},{"value":"0.1399","scoring_system":"epss","scoring_elements":"0.94395","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8853"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://rt.perl.org/Public/Bug/Display.html?id=123562","reference_id":"","reference_type":"","scores":[],"url":"https://rt.perl.org/Public/Bug/Display.html?id=123562"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/04/20/5","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/04/20/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/04/20/7","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/04/20/7"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"},{"reference_url":"http://www.securityfocus.com/bid/86707","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/86707"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329106","reference_id":"1329106","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1329106"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=821848","reference_id":"821848","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=821848"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8853","reference_id":"CVE-2015-8853","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8853"},{"reference_url":"https://security.gentoo.org/glsa/201701-75","reference_id":"GLSA-201701-75","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-75"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6206","reference_id":"RHSA-2026:6206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6206"},{"reference_url":"https://usn.ubuntu.com/3625-1/","reference_id":"USN-3625-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3625-1/"},{"reference_url":"https://usn.ubuntu.com/3625-2/","reference_id":"USN-3625-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3625-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037017?format=json","purl":"pkg:deb/debian/perl@5.24.1-3%2Bdeb9u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.24.1-3%252Bdeb9u7"}],"aliases":["CVE-2015-8853"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2tv2-wp3x-xbbu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48384?format=json","vulnerability_id":"VCID-6crh-5jp9-c3f8","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7","reference_id":"","reference_type":"","scores":[],"url":"http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6185.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6185.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6185","reference_id":"","reference_type":"","scores":[{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.4767","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47751","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47681","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47624","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47653","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47744","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47707","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47728","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47678","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47732","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47753","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.4773","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.4774","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47795","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47788","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47721","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47677","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47594","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00245","scoring_system":"epss","scoring_elements":"0.47659","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56135","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/"},{"reference_url":"https://rt.cpan.org/Public/Bug/Display.html?id=115808","reference_id":"","reference_type":"","scores":[],"url":"https://rt.cpan.org/Public/Bug/Display.html?id=115808"},{"reference_url":"http://www.debian.org/security/2016/dsa-3628","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3628"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/07/07/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/07/07/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/07/08/5","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/07/08/5"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"},{"reference_url":"http://www.securityfocus.com/bid/91685","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/91685"},{"reference_url":"http://www.securitytracker.com/id/1036260","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036260"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1354386","reference_id":"1354386","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1354386"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829578","reference_id":"829578","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829578"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6185","reference_id":"CVE-2016-6185","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6185"},{"reference_url":"https://security.gentoo.org/glsa/201701-75","reference_id":"GLSA-201701-75","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-75"},{"reference_url":"https://usn.ubuntu.com/3625-1/","reference_id":"USN-3625-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3625-1/"},{"reference_url":"https://usn.ubuntu.com/3625-2/","reference_id":"USN-3625-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3625-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035728?format=json","purl":"pkg:deb/debian/perl@5.20.2-3%2Bdeb8u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2tv2-wp3x-xbbu"},{"vulnerability":"VCID-6crh-5jp9-c3f8"},{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-9s8b-4xp8-43fn"},{"vulnerability":"VCID-9uk5-5wp6-8kbv"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-drgw-n9p3-ryhd"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-xrsg-uv6h-zubj"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.20.2-3%252Bdeb8u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037017?format=json","purl":"pkg:deb/debian/perl@5.24.1-3%2Bdeb9u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.24.1-3%252Bdeb9u7"}],"aliases":["CVE-2016-6185"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6crh-5jp9-c3f8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63887?format=json","vulnerability_id":"VCID-9ff8-ad5m-dbfb","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12837.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12837.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12837","reference_id":"","reference_type":"","scores":[{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86876","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.87077","published_at":"2026-05-16T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.87024","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.87038","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.8707","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.87076","published_at":"2026-05-15T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86886","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86905","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86898","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86919","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86927","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.8694","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86935","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.8693","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86945","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86949","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86948","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86965","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86971","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86973","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86994","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.87011","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.87029","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12883"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:N/A:N"},{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://perl5.git.perl.org/perl.git/commitdiff/96c83ed78aeea1a0496dd2b2d935869a822dc8a5","reference_id":"","reference_type":"","scores":[],"url":"https://perl5.git.perl.org/perl.git/commitdiff/96c83ed78aeea1a0496dd2b2d935869a822dc8a5"},{"reference_url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1","reference_id":"","reference_type":"","scores":[],"url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1"},{"reference_url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1","reference_id":"","reference_type":"","scores":[],"url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1"},{"reference_url":"https://rt.perl.org/Public/Bug/Display.html?id=131582","reference_id":"","reference_type":"","scores":[],"url":"https://rt.perl.org/Public/Bug/Display.html?id=131582"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180426-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20180426-0001/"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3982","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3982"},{"reference_url":"http://www.securityfocus.com/bid/100860","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/100860"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1492091","reference_id":"1492091","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1492091"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875596","reference_id":"875596","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875596"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12837","reference_id":"CVE-2017-12837","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6206","reference_id":"RHSA-2026:6206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6206"},{"reference_url":"https://usn.ubuntu.com/3478-1/","reference_id":"USN-3478-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3478-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035728?format=json","purl":"pkg:deb/debian/perl@5.20.2-3%2Bdeb8u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2tv2-wp3x-xbbu"},{"vulnerability":"VCID-6crh-5jp9-c3f8"},{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-9s8b-4xp8-43fn"},{"vulnerability":"VCID-9uk5-5wp6-8kbv"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-drgw-n9p3-ryhd"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-xrsg-uv6h-zubj"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.20.2-3%252Bdeb8u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037017?format=json","purl":"pkg:deb/debian/perl@5.24.1-3%2Bdeb9u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.24.1-3%252Bdeb9u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2017-12837"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9ff8-ad5m-dbfb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48378?format=json","vulnerability_id":"VCID-9s8b-4xp8-43fn","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"http://cpansearch.perl.org/src/RJBS/PathTools-3.62/Changes","reference_id":"","reference_type":"","scores":[],"url":"http://cpansearch.perl.org/src/RJBS/PathTools-3.62/Changes"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175494.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175494.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176228.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176228.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8607.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8607.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8607","reference_id":"","reference_type":"","scores":[{"value":"0.05664","scoring_system":"epss","scoring_elements":"0.90471","published_at":"2026-05-16T12:55:00Z"},{"value":"0.05664","scoring_system":"epss","scoring_elements":"0.9047","published_at":"2026-05-15T12:55:00Z"},{"value":"0.05664","scoring_system":"epss","scoring_elements":"0.90339","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05664","scoring_system":"epss","scoring_elements":"0.90341","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05664","scoring_system":"epss","scoring_elements":"0.90353","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05664","scoring_system":"epss","scoring_elements":"0.90357","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05664","scoring_system":"epss","scoring_elements":"0.90371","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05664","scoring_system":"epss","scoring_elements":"0.90377","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05664","scoring_system":"epss","scoring_elements":"0.90385","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05664","scoring_system":"epss","scoring_elements":"0.90379","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05664","scoring_system":"epss","scoring_elements":"0.90394","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05664","scoring_system":"epss","scoring_elements":"0.90391","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05664","scoring_system":"epss","scoring_elements":"0.90406","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05664","scoring_system":"epss","scoring_elements":"0.90405","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05664","scoring_system":"epss","scoring_elements":"0.90401","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05664","scoring_system":"epss","scoring_elements":"0.90414","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05664","scoring_system":"epss","scoring_elements":"0.90431","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05664","scoring_system":"epss","scoring_elements":"0.90443","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05664","scoring_system":"epss","scoring_elements":"0.90441","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05664","scoring_system":"epss","scoring_elements":"0.90449","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05664","scoring_system":"epss","scoring_elements":"0.90463","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8607"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://rt.perl.org/Public/Bug/Display.html?id=126862","reference_id":"","reference_type":"","scores":[],"url":"https://rt.perl.org/Public/Bug/Display.html?id=126862"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"http://www.debian.org/security/2016/dsa-3441","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3441"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"reference_url":"http://www.securityfocus.com/bid/80504","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/80504"},{"reference_url":"http://www.securitytracker.com/id/1034772","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034772"},{"reference_url":"http://www.ubuntu.com/usn/USN-2878-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2878-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1293272","reference_id":"1293272","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1293272"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810719","reference_id":"810719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810719"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:pathtools:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:pathtools:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:pathtools:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8607","reference_id":"CVE-2015-8607","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8607"},{"reference_url":"https://security.gentoo.org/glsa/201701-75","reference_id":"GLSA-201701-75","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-75"},{"reference_url":"https://usn.ubuntu.com/2878-1/","reference_id":"USN-2878-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2878-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035728?format=json","purl":"pkg:deb/debian/perl@5.20.2-3%2Bdeb8u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2tv2-wp3x-xbbu"},{"vulnerability":"VCID-6crh-5jp9-c3f8"},{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-9s8b-4xp8-43fn"},{"vulnerability":"VCID-9uk5-5wp6-8kbv"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-drgw-n9p3-ryhd"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-xrsg-uv6h-zubj"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.20.2-3%252Bdeb8u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037017?format=json","purl":"pkg:deb/debian/perl@5.24.1-3%2Bdeb9u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.24.1-3%252Bdeb9u7"}],"aliases":["CVE-2015-8607"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9s8b-4xp8-43fn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48381?format=json","vulnerability_id":"VCID-9uk5-5wp6-8kbv","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"},{"reference_url":"http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","reference_id":"","reference_type":"","scores":[],"url":"http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1238.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1238.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1238","reference_id":"","reference_type":"","scores":[{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54887","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55678","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55718","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55722","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.557","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55625","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55643","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55619","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.5567","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55613","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55566","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55696","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00336","scoring_system":"epss","scoring_elements":"0.56402","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00336","scoring_system":"epss","scoring_elements":"0.565","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00336","scoring_system":"epss","scoring_elements":"0.56522","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00336","scoring_system":"epss","scoring_elements":"0.56502","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00336","scoring_system":"epss","scoring_elements":"0.56552","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00336","scoring_system":"epss","scoring_elements":"0.56558","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00336","scoring_system":"epss","scoring_elements":"0.56568","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56846","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56863","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.5676","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56783","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1238"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c%40%3Cannounce.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c%40%3Cannounce.apache.org%3E"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/"},{"reference_url":"https://rt.perl.org/Public/Bug/Display.html?id=127834","reference_id":"","reference_type":"","scores":[],"url":"https://rt.perl.org/Public/Bug/Display.html?id=127834"},{"reference_url":"http://www.debian.org/security/2016/dsa-3628","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3628"},{"reference_url":"http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html"},{"reference_url":"http://www.securityfocus.com/bid/92136","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92136"},{"reference_url":"http://www.securitytracker.com/id/1036440","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036440"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1355695","reference_id":"1355695","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1355695"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spamassassin:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:spamassassin:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spamassassin:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:1.0.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:1.0.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:1.0.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:1.0.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:1.0.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:1.0.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.000:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.000:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.000:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.000o:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.000o:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.000o:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.001:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.001:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.001:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.001n:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.001n:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.001n:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.002:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.002:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.002:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.002_01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.002_01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.002_01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_05:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_05:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_05:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_07:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_07:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_07:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_08:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_08:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_08:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_09:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_09:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_09:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_90:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_90:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_90:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_91:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_91:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_91:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_92:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_92:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_92:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_93:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_93:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_93:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_94:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_94:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_94:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_95:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_95:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_95:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_96:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_96:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_96:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_97:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_97:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_97:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_97a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_97a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_97a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_97b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_97b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_97b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_97c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_97c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_97c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_97d:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_97d:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_97d:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_97e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_97e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_97e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_97f:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_97f:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_97f:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_97g:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_97g:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_97g:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_97h:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_97h:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_97h:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_97i:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_97i:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_97i:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_97j:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_97j:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_97j:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_98:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_98:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_98:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_99:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_99:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_99:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_99a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.003_99a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.003_99a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.004:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.004:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.004:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.004_01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.004_01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.004_01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.004_02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.004_02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.004_02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.004_03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.004_03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.004_03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.004_04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.004_04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.004_04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.004_05:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.004_05:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.004_05:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.005:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.005:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.005:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.005_01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.005_01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.005_01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.005_02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.005_02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.005_02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.005_03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.005_03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.005_03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.005_04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.005_04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.005_04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.1:rc0:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.12.1:rc0:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.1:rc0:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.12.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.4:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.12.4:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.4:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.4:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.12.4:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.4:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.12.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.5:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.12.5:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.5:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.5:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.12.5:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.5:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.14.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.14.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.14.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.14.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.14.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.3:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.14.3:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.3:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.14.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.4:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.14.4:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.4:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.4:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.14.4:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.4:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.15.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.15.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.15.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.15.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.15.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.15.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.15.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.15.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.15.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.15.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.15.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.15.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.15.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.15.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.15.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.15.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.15.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.15.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.15.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.15.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.15.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.16.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.16.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.16.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.16.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.16.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.16.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.16.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.16.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.16.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.16.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.16.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.16.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.16.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.16.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.16.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.16.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.16.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.16.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.16.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.16.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.16.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.17.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.17.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.17.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.17.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.17.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.17.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.17.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.17.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.17.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.17.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.17.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.17.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.17.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.18.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.18.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.18.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.18.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.0:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.18.0:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.0:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.18.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.18.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.18.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.2:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.18.2:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.2:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.2:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.18.2:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.2:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.2:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.18.2:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.2:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.18.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.18.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.3:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.18.3:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.3:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.18.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.18.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.19.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.19.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.19.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.19.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.19.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.19.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.19.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.19.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.19.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.19.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.19.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.19.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.20.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.20.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.20.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.20.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.20.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.20.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.20.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.20.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.20.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.20.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.20.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.20.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.20.1:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.20.1:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.20.1:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.20.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.20.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.20.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.20.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.20.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.20.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.20.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.20.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.20.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.20.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.20.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.20.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.20.3:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.20.3:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.20.3:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.21.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.21.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.21.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.21.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.21.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.21.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.21.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.21.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.21.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.21.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.21.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.21.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.21.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.22.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.22.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.22.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.22.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.22.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.22.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.22.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.22.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.22.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.22.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.22.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.22.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.22.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.22.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.22.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.22.1:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.22.1:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.22.1:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.22.1:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.22.1:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.22.1:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.22.1:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.22.1:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.22.1:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.22.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.22.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.22.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.22.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.22.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.22.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.22.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.22.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.22.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.24.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.24.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.24.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.24.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.24.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.24.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.24.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.24.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.24.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.24.0:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.24.0:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.24.0:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.24.0:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.24.0:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.24.0:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.24.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.24.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.24.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.9:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.8.9:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.9:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1238","reference_id":"CVE-2016-1238","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1238"},{"reference_url":"https://security.gentoo.org/glsa/201701-75","reference_id":"GLSA-201701-75","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-75"},{"reference_url":"https://security.gentoo.org/glsa/201812-07","reference_id":"GLSA-201812-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201812-07"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035728?format=json","purl":"pkg:deb/debian/perl@5.20.2-3%2Bdeb8u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2tv2-wp3x-xbbu"},{"vulnerability":"VCID-6crh-5jp9-c3f8"},{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-9s8b-4xp8-43fn"},{"vulnerability":"VCID-9uk5-5wp6-8kbv"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-drgw-n9p3-ryhd"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-xrsg-uv6h-zubj"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.20.2-3%252Bdeb8u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037017?format=json","purl":"pkg:deb/debian/perl@5.24.1-3%2Bdeb9u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.24.1-3%252Bdeb9u7"}],"aliases":["CVE-2016-1238"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9uk5-5wp6-8kbv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33752?format=json","vulnerability_id":"VCID-drgw-n9p3-ryhd","summary":"A vulnerability in module File::Path for Perl allows local\n    attackers to set arbitrary mode values on arbitrary files bypassing\n    security restrictions.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6512.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6512.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6512","reference_id":"","reference_type":"","scores":[{"value":"0.00895","scoring_system":"epss","scoring_elements":"0.75544","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00895","scoring_system":"epss","scoring_elements":"0.75642","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00895","scoring_system":"epss","scoring_elements":"0.75601","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00895","scoring_system":"epss","scoring_elements":"0.75638","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00895","scoring_system":"epss","scoring_elements":"0.75627","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00895","scoring_system":"epss","scoring_elements":"0.75666","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00895","scoring_system":"epss","scoring_elements":"0.75671","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00895","scoring_system":"epss","scoring_elements":"0.75683","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00895","scoring_system":"epss","scoring_elements":"0.75687","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00895","scoring_system":"epss","scoring_elements":"0.75716","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00895","scoring_system":"epss","scoring_elements":"0.75547","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00895","scoring_system":"epss","scoring_elements":"0.75577","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00895","scoring_system":"epss","scoring_elements":"0.75557","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00895","scoring_system":"epss","scoring_elements":"0.75591","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00895","scoring_system":"epss","scoring_elements":"0.75602","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00895","scoring_system":"epss","scoring_elements":"0.75626","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00895","scoring_system":"epss","scoring_elements":"0.75608","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01167","scoring_system":"epss","scoring_elements":"0.78789","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01167","scoring_system":"epss","scoring_elements":"0.78775","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01167","scoring_system":"epss","scoring_elements":"0.78772","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80498","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80503","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80506","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6512"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:P/A:N"},{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1457832","reference_id":"1457832","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1457832"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863870","reference_id":"863870","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863870"},{"reference_url":"https://security.gentoo.org/glsa/201709-12","reference_id":"GLSA-201709-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-12"},{"reference_url":"https://usn.ubuntu.com/3625-1/","reference_id":"USN-3625-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3625-1/"},{"reference_url":"https://usn.ubuntu.com/3625-2/","reference_id":"USN-3625-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3625-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035728?format=json","purl":"pkg:deb/debian/perl@5.20.2-3%2Bdeb8u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2tv2-wp3x-xbbu"},{"vulnerability":"VCID-6crh-5jp9-c3f8"},{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-9s8b-4xp8-43fn"},{"vulnerability":"VCID-9uk5-5wp6-8kbv"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-drgw-n9p3-ryhd"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-xrsg-uv6h-zubj"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.20.2-3%252Bdeb8u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037017?format=json","purl":"pkg:deb/debian/perl@5.24.1-3%2Bdeb9u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.24.1-3%252Bdeb9u7"}],"aliases":["CVE-2017-6512"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-drgw-n9p3-ryhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59315?format=json","vulnerability_id":"VCID-efz8-y2qe-dkgj","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18311.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18311.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18311","reference_id":"","reference_type":"","scores":[{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93514","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93523","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93531","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.9353","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93539","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93542","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93548","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93547","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93567","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93573","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93579","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93583","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93582","published_at":"2026-04-26T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.9358","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93587","published_at":"2026-05-05T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93601","published_at":"2026-05-07T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93611","published_at":"2026-05-09T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93612","published_at":"2026-05-11T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93618","published_at":"2026-05-12T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93631","published_at":"2026-05-16T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93637","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646730","reference_id":"1646730","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646730"},{"reference_url":"https://security.gentoo.org/glsa/201909-01","reference_id":"GLSA-201909-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201909-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0001","reference_id":"RHSA-2019:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0010","reference_id":"RHSA-2019:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0109","reference_id":"RHSA-2019:0109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1790","reference_id":"RHSA-2019:1790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1942","reference_id":"RHSA-2019:1942","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1942"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2400","reference_id":"RHSA-2019:2400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2400"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7604","reference_id":"RHSA-2026:7604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7604"},{"reference_url":"https://usn.ubuntu.com/3834-1/","reference_id":"USN-3834-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3834-1/"},{"reference_url":"https://usn.ubuntu.com/3834-2/","reference_id":"USN-3834-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3834-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037017?format=json","purl":"pkg:deb/debian/perl@5.24.1-3%2Bdeb9u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.24.1-3%252Bdeb9u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2018-18311"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-efz8-y2qe-dkgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59318?format=json","vulnerability_id":"VCID-fcg3-35wj-1bbm","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18314.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18314.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18314","reference_id":"","reference_type":"","scores":[{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89891","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89907","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89912","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89929","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89934","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89942","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.8994","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89933","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89948","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.8995","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89944","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89961","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.8996","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89958","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89972","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89987","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89999","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89994","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.90002","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.90017","published_at":"2026-05-14T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.90025","published_at":"2026-05-15T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.90026","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646751","reference_id":"1646751","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646751"},{"reference_url":"https://security.gentoo.org/glsa/201909-01","reference_id":"GLSA-201909-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201909-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0001","reference_id":"RHSA-2019:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0010","reference_id":"RHSA-2019:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7604","reference_id":"RHSA-2026:7604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7604"},{"reference_url":"https://usn.ubuntu.com/3834-1/","reference_id":"USN-3834-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3834-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037017?format=json","purl":"pkg:deb/debian/perl@5.24.1-3%2Bdeb9u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.24.1-3%252Bdeb9u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2018-18314"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fcg3-35wj-1bbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63888?format=json","vulnerability_id":"VCID-hyw2-vhpu-uya2","summary":"security update","references":[{"reference_url":"http://mirror.cucumberlinux.com/cucumber/cucumber-1.0/source/lang-base/perl/patches/CVE-2017-12883.patch","reference_id":"","reference_type":"","scores":[],"url":"http://mirror.cucumberlinux.com/cucumber/cucumber-1.0/source/lang-base/perl/patches/CVE-2017-12883.patch"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12883.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12883.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12883","reference_id":"","reference_type":"","scores":[{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89053","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89107","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89062","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89077","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89079","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89097","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89102","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89113","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89109","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89121","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89448","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89478","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89489","published_at":"2026-05-15T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89406","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89408","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89417","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89435","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89458","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89488","published_at":"2026-05-16T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89387","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89384","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89401","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12883"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:P"},{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300f#patch1","reference_id":"","reference_type":"","scores":[],"url":"https://perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300f#patch1"},{"reference_url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1","reference_id":"","reference_type":"","scores":[],"url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1"},{"reference_url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1","reference_id":"","reference_type":"","scores":[],"url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1"},{"reference_url":"https://rt.perl.org/Public/Bug/Display.html?id=131598","reference_id":"","reference_type":"","scores":[],"url":"https://rt.perl.org/Public/Bug/Display.html?id=131598"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180426-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20180426-0001/"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3982","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3982"},{"reference_url":"http://www.securityfocus.com/bid/100852","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/100852"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1492093","reference_id":"1492093","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1492093"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875597","reference_id":"875597","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875597"},{"reference_url":"https://security.archlinux.org/AVG-500","reference_id":"AVG-500","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-500"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12883","reference_id":"CVE-2017-12883","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:P"},{"value":"9.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6206","reference_id":"RHSA-2026:6206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6206"},{"reference_url":"https://usn.ubuntu.com/3478-1/","reference_id":"USN-3478-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3478-1/"},{"reference_url":"https://usn.ubuntu.com/3478-2/","reference_id":"USN-3478-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3478-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035728?format=json","purl":"pkg:deb/debian/perl@5.20.2-3%2Bdeb8u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2tv2-wp3x-xbbu"},{"vulnerability":"VCID-6crh-5jp9-c3f8"},{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-9s8b-4xp8-43fn"},{"vulnerability":"VCID-9uk5-5wp6-8kbv"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-drgw-n9p3-ryhd"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-xrsg-uv6h-zubj"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.20.2-3%252Bdeb8u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037017?format=json","purl":"pkg:deb/debian/perl@5.24.1-3%2Bdeb9u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.24.1-3%252Bdeb9u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2017-12883"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hyw2-vhpu-uya2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59317?format=json","vulnerability_id":"VCID-p9gy-p1x1-ayfw","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18313.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18313.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18313","reference_id":"","reference_type":"","scores":[{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88602","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88611","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88627","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88629","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88647","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88652","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88664","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88657","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.8867","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88667","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88665","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.8868","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88686","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88685","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88696","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88712","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88725","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88722","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88733","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88757","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88767","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88766","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646738","reference_id":"1646738","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646738"},{"reference_url":"https://security.gentoo.org/glsa/201909-01","reference_id":"GLSA-201909-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201909-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0001","reference_id":"RHSA-2019:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0010","reference_id":"RHSA-2019:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7604","reference_id":"RHSA-2026:7604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7604"},{"reference_url":"https://usn.ubuntu.com/3834-1/","reference_id":"USN-3834-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3834-1/"},{"reference_url":"https://usn.ubuntu.com/3834-2/","reference_id":"USN-3834-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3834-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037017?format=json","purl":"pkg:deb/debian/perl@5.24.1-3%2Bdeb9u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.24.1-3%252Bdeb9u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2018-18313"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p9gy-p1x1-ayfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73643?format=json","vulnerability_id":"VCID-tkh2-ctmb-q7fm","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12015.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12015.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12015","reference_id":"","reference_type":"","scores":[{"value":"0.15065","scoring_system":"epss","scoring_elements":"0.94546","published_at":"2026-04-02T12:55:00Z"},{"value":"0.15065","scoring_system":"epss","scoring_elements":"0.94539","published_at":"2026-04-01T12:55:00Z"},{"value":"0.15065","scoring_system":"epss","scoring_elements":"0.94554","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94852","published_at":"2026-05-16T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94836","published_at":"2026-05-12T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94847","published_at":"2026-05-14T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.9485","published_at":"2026-05-15T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94761","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.9477","published_at":"2026-04-08T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94774","published_at":"2026-04-09T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94782","published_at":"2026-04-12T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94783","published_at":"2026-04-13T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.9479","published_at":"2026-04-16T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94794","published_at":"2026-04-18T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94796","published_at":"2026-04-21T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94797","published_at":"2026-04-24T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94798","published_at":"2026-04-26T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.948","published_at":"2026-04-29T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94808","published_at":"2026-05-05T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94815","published_at":"2026-05-07T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94825","published_at":"2026-05-09T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94831","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12015"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900834","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900834"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12015","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12015"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Mar/49","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Mar/49"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://seclists.org/bugtraq/2019/Mar/42","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Mar/42"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180927-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20180927-0001/"},{"reference_url":"https://support.apple.com/kb/HT209600","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209600"},{"reference_url":"https://www.debian.org/security/2018/dsa-4226","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4226"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"http://www.securityfocus.com/bid/104423","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104423"},{"reference_url":"http://www.securitytracker.com/id/1041048","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1041048"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1588760","reference_id":"1588760","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1588760"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:archive\\:\\:tar_project:archive\\:\\:tar:*:*:*:*:*:perl:*:*","reference_id":"cpe:2.3:a:archive\\:\\:tar_project:archive\\:\\:tar:*:*:*:*:*:perl:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:archive\\:\\:tar_project:archive\\:\\:tar:*:*:*:*:*:perl:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapdrive:-:*:*:*:*:unix:*:*","reference_id":"cpe:2.3:a:netapp:snapdrive:-:*:*:*:*:unix:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapdrive:-:*:*:*:*:unix:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-12015","reference_id":"CVE-2018-12015","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-12015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2097","reference_id":"RHSA-2019:2097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7604","reference_id":"RHSA-2026:7604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7604"},{"reference_url":"https://usn.ubuntu.com/3684-1/","reference_id":"USN-3684-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3684-1/"},{"reference_url":"https://usn.ubuntu.com/3684-2/","reference_id":"USN-3684-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3684-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035728?format=json","purl":"pkg:deb/debian/perl@5.20.2-3%2Bdeb8u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2tv2-wp3x-xbbu"},{"vulnerability":"VCID-6crh-5jp9-c3f8"},{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-9s8b-4xp8-43fn"},{"vulnerability":"VCID-9uk5-5wp6-8kbv"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-drgw-n9p3-ryhd"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-xrsg-uv6h-zubj"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.20.2-3%252Bdeb8u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037017?format=json","purl":"pkg:deb/debian/perl@5.24.1-3%2Bdeb9u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.24.1-3%252Bdeb9u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2018-12015"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tkh2-ctmb-q7fm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59316?format=json","vulnerability_id":"VCID-vbkg-c84e-g3dx","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18312.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18312.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18312","reference_id":"","reference_type":"","scores":[{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.9334","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93349","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93356","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93355","published_at":"2026-04-07T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93363","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93367","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93372","published_at":"2026-04-13T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93371","published_at":"2026-04-12T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.9339","published_at":"2026-04-16T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93395","published_at":"2026-04-18T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93401","published_at":"2026-04-26T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93404","published_at":"2026-04-24T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.934","published_at":"2026-04-29T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93406","published_at":"2026-05-05T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93418","published_at":"2026-05-07T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93429","published_at":"2026-05-11T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93435","published_at":"2026-05-12T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93449","published_at":"2026-05-16T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93455","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646734","reference_id":"1646734","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646734"},{"reference_url":"https://security.gentoo.org/glsa/201909-01","reference_id":"GLSA-201909-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201909-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0001","reference_id":"RHSA-2019:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0010","reference_id":"RHSA-2019:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7604","reference_id":"RHSA-2026:7604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7604"},{"reference_url":"https://usn.ubuntu.com/3834-1/","reference_id":"USN-3834-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3834-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037017?format=json","purl":"pkg:deb/debian/perl@5.24.1-3%2Bdeb9u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.24.1-3%252Bdeb9u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2018-18312"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vbkg-c84e-g3dx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59321?format=json","vulnerability_id":"VCID-xm1g-4mbg-cud5","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6913.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6913.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6913","reference_id":"","reference_type":"","scores":[{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88218","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88226","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88241","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88246","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88265","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88271","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88283","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88274","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88288","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88286","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88285","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88303","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88308","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88311","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88322","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88338","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.8835","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88347","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.8836","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88388","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88396","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6913"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6913"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547772","reference_id":"1547772","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547772"},{"reference_url":"https://security.gentoo.org/glsa/201909-01","reference_id":"GLSA-201909-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201909-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6206","reference_id":"RHSA-2026:6206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6206"},{"reference_url":"https://usn.ubuntu.com/3625-1/","reference_id":"USN-3625-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3625-1/"},{"reference_url":"https://usn.ubuntu.com/3625-2/","reference_id":"USN-3625-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3625-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035728?format=json","purl":"pkg:deb/debian/perl@5.20.2-3%2Bdeb8u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2tv2-wp3x-xbbu"},{"vulnerability":"VCID-6crh-5jp9-c3f8"},{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-9s8b-4xp8-43fn"},{"vulnerability":"VCID-9uk5-5wp6-8kbv"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-drgw-n9p3-ryhd"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-xrsg-uv6h-zubj"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.20.2-3%252Bdeb8u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037017?format=json","purl":"pkg:deb/debian/perl@5.24.1-3%2Bdeb9u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.24.1-3%252Bdeb9u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2018-6913"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xm1g-4mbg-cud5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48382?format=json","vulnerability_id":"VCID-xrsg-uv6h-zubj","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html"},{"reference_url":"http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076","reference_id":"","reference_type":"","scores":[],"url":"http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2381.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2381.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2381","reference_id":"","reference_type":"","scores":[{"value":"0.19468","scoring_system":"epss","scoring_elements":"0.95357","published_at":"2026-04-01T12:55:00Z"},{"value":"0.19468","scoring_system":"epss","scoring_elements":"0.95366","published_at":"2026-04-02T12:55:00Z"},{"value":"0.19468","scoring_system":"epss","scoring_elements":"0.95372","published_at":"2026-04-04T12:55:00Z"},{"value":"0.19468","scoring_system":"epss","scoring_elements":"0.95377","published_at":"2026-04-07T12:55:00Z"},{"value":"0.19468","scoring_system":"epss","scoring_elements":"0.95384","published_at":"2026-04-08T12:55:00Z"},{"value":"0.19468","scoring_system":"epss","scoring_elements":"0.95386","published_at":"2026-04-09T12:55:00Z"},{"value":"0.19468","scoring_system":"epss","scoring_elements":"0.95391","published_at":"2026-04-12T12:55:00Z"},{"value":"0.19468","scoring_system":"epss","scoring_elements":"0.95394","published_at":"2026-04-13T12:55:00Z"},{"value":"0.19468","scoring_system":"epss","scoring_elements":"0.95401","published_at":"2026-04-16T12:55:00Z"},{"value":"0.19468","scoring_system":"epss","scoring_elements":"0.95405","published_at":"2026-04-18T12:55:00Z"},{"value":"0.19468","scoring_system":"epss","scoring_elements":"0.95408","published_at":"2026-04-24T12:55:00Z"},{"value":"0.27444","scoring_system":"epss","scoring_elements":"0.96457","published_at":"2026-05-12T12:55:00Z"},{"value":"0.27444","scoring_system":"epss","scoring_elements":"0.96469","published_at":"2026-05-15T12:55:00Z"},{"value":"0.27444","scoring_system":"epss","scoring_elements":"0.9647","published_at":"2026-05-16T12:55:00Z"},{"value":"0.27444","scoring_system":"epss","scoring_elements":"0.96449","published_at":"2026-05-09T12:55:00Z"},{"value":"0.27444","scoring_system":"epss","scoring_elements":"0.96452","published_at":"2026-05-11T12:55:00Z"},{"value":"0.27444","scoring_system":"epss","scoring_elements":"0.96467","published_at":"2026-05-14T12:55:00Z"},{"value":"0.27444","scoring_system":"epss","scoring_elements":"0.96431","published_at":"2026-04-26T12:55:00Z"},{"value":"0.27444","scoring_system":"epss","scoring_elements":"0.96433","published_at":"2026-04-29T12:55:00Z"},{"value":"0.27444","scoring_system":"epss","scoring_elements":"0.9644","published_at":"2026-05-05T12:55:00Z"},{"value":"0.27444","scoring_system":"epss","scoring_elements":"0.96443","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"http://www.debian.org/security/2016/dsa-3501","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3501"},{"reference_url":"http://www.gossamer-threads.com/lists/perl/porters/326387","reference_id":"","reference_type":"","scores":[],"url":"http://www.gossamer-threads.com/lists/perl/porters/326387"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"},{"reference_url":"http://www.securityfocus.com/bid/83802","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83802"},{"reference_url":"http://www.ubuntu.com/usn/USN-2916-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2916-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1309214","reference_id":"1309214","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1309214"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_billing_and_revenue_management:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_billing_and_revenue_management:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_billing_and_revenue_management:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:configuration_manager:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:configuration_manager:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:configuration_manager:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:configuration_manager:12.1.2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:configuration_manager:12.1.2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:configuration_manager:12.1.2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:12.1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:database_server:12.1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:12.1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:12.2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:database_server:12.2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:12.2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:18c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:database_server:18c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:18c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:19c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:database_server:19c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:19c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.0.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.0.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.0.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2381","reference_id":"CVE-2016-2381","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2381"},{"reference_url":"https://security.gentoo.org/glsa/201701-75","reference_id":"GLSA-201701-75","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-75"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6206","reference_id":"RHSA-2026:6206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6206"},{"reference_url":"https://usn.ubuntu.com/2916-1/","reference_id":"USN-2916-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2916-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571928?format=json","purl":"pkg:deb/debian/perl@5.14.2-21%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2tv2-wp3x-xbbu"},{"vulnerability":"VCID-55tr-re4z-9kb2"},{"vulnerability":"VCID-6crh-5jp9-c3f8"},{"vulnerability":"VCID-7y94-9sak-zfd7"},{"vulnerability":"VCID-93kg-31zq-1qcr"},{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-9n1u-99cs-pyc3"},{"vulnerability":"VCID-9s8b-4xp8-43fn"},{"vulnerability":"VCID-9uk5-5wp6-8kbv"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-drgw-n9p3-ryhd"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-xrsg-uv6h-zubj"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.14.2-21%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035728?format=json","purl":"pkg:deb/debian/perl@5.20.2-3%2Bdeb8u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2tv2-wp3x-xbbu"},{"vulnerability":"VCID-6crh-5jp9-c3f8"},{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-9s8b-4xp8-43fn"},{"vulnerability":"VCID-9uk5-5wp6-8kbv"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-drgw-n9p3-ryhd"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-xrsg-uv6h-zubj"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.20.2-3%252Bdeb8u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037017?format=json","purl":"pkg:deb/debian/perl@5.24.1-3%2Bdeb9u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.24.1-3%252Bdeb9u7"}],"aliases":["CVE-2016-2381"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xrsg-uv6h-zubj"}],"risk_score":"4.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.24.1-3%252Bdeb9u7"}