{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","type":"deb","namespace":"debian","name":"perl","version":"5.28.1-6+deb10u1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"5.40.1-6","latest_non_vulnerable_version":"5.40.1-6","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47707?format=json","vulnerability_id":"VCID-a1cw-hg74-v3c3","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10878.json","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10878.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10878","reference_id":"","reference_type":"","scores":[{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.29062","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.29113","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28925","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2899","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.29033","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.29037","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28993","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28943","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28986","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29039","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2906","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29141","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29551","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29524","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29478","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29365","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29251","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29186","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29041","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29101","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29115","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10878"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1837988","reference_id":"1837988","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1837988"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962005","reference_id":"962005","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962005"},{"reference_url":"https://security.gentoo.org/glsa/202006-03","reference_id":"GLSA-202006-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202006-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0343","reference_id":"RHSA-2021:0343","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0883","reference_id":"RHSA-2021:0883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1032","reference_id":"RHSA-2021:1032","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1032"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1266","reference_id":"RHSA-2021:1266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1678","reference_id":"RHSA-2021:1678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2792","reference_id":"RHSA-2021:2792","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2792"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7604","reference_id":"RHSA-2026:7604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7604"},{"reference_url":"https://usn.ubuntu.com/4602-1/","reference_id":"USN-4602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4602-1/"},{"reference_url":"https://usn.ubuntu.com/4602-2/","reference_id":"USN-4602-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4602-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994892?format=json","purl":"pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-vgg2-vymx-b3fe"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3"}],"aliases":["CVE-2020-10878"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a1cw-hg74-v3c3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48233?format=json","vulnerability_id":"VCID-hf7c-n8hb-q7dk","summary":"Multiple vulnerabilities have been discovered in Perl, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36770.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36770.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-36770","reference_id":"","reference_type":"","scores":[{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26076","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.2608","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29449","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29262","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29327","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29367","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.2937","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29324","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29271","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29296","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.28877","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29329","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.294","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.28777","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.28796","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29329","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29391","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29404","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29471","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-36770"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36770","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36770"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1983786","reference_id":"1983786","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1983786"},{"reference_url":"https://security.archlinux.org/AVG-2264","reference_id":"AVG-2264","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2264"},{"reference_url":"https://security.gentoo.org/glsa/202411-09","reference_id":"GLSA-202411-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202411-09"},{"reference_url":"https://usn.ubuntu.com/5033-1/","reference_id":"USN-5033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5033-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994892?format=json","purl":"pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-vgg2-vymx-b3fe"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3"}],"aliases":["CVE-2021-36770"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hf7c-n8hb-q7dk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78456?format=json","vulnerability_id":"VCID-kcy1-7ny3-sufc","summary":"perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31484.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31484.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-31484","reference_id":"","reference_type":"","scores":[{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78776","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78822","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78893","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78877","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.7887","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78842","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78844","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78847","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78819","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78828","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78808","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.7879","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78816","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01189","scoring_system":"epss","scoring_elements":"0.78845","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01314","scoring_system":"epss","scoring_elements":"0.79964","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01314","scoring_system":"epss","scoring_elements":"0.79978","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01314","scoring_system":"epss","scoring_elements":"0.79926","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01314","scoring_system":"epss","scoring_elements":"0.79961","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01314","scoring_system":"epss","scoring_elements":"0.79949","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01314","scoring_system":"epss","scoring_elements":"0.80016","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-31484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31484"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/04/29/1","reference_id":"1","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-12T15:22:37Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/04/29/1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035109","reference_id":"1035109","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035109"},{"reference_url":"https://www.openwall.com/lists/oss-security/2023/04/18/14","reference_id":"14","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-12T15:22:37Z/"}],"url":"https://www.openwall.com/lists/oss-security/2023/04/18/14"},{"reference_url":"https://github.com/andk/cpanpm/pull/175","reference_id":"175","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-12T15:22:37Z/"}],"url":"https://github.com/andk/cpanpm/pull/175"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/05/07/2","reference_id":"2","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-12T15:22:37Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/05/07/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218667","reference_id":"2218667","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218667"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/05/03/3","reference_id":"3","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-12T15:22:37Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/05/03/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/05/03/5","reference_id":"5","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-12T15:22:37Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/05/03/5"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/","reference_id":"BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-12T15:22:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/"},{"reference_url":"https://metacpan.org/dist/CPAN/changes","reference_id":"changes","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-12T15:22:37Z/"}],"url":"https://metacpan.org/dist/CPAN/changes"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/","reference_id":"LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-12T15:22:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240621-0007/","reference_id":"ntap-20240621-0007","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-12T15:22:37Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240621-0007/"},{"reference_url":"https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/","reference_id":"perl-http-tiny-insecure-tls-default-affects-cpan-modules","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-12T15:22:37Z/"}],"url":"https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6539","reference_id":"RHSA-2023:6539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3094","reference_id":"RHSA-2024:3094","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3094"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0079","reference_id":"RHSA-2026:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7604","reference_id":"RHSA-2026:7604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7604"},{"reference_url":"https://usn.ubuntu.com/6112-1/","reference_id":"USN-6112-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6112-1/"},{"reference_url":"https://usn.ubuntu.com/6112-2/","reference_id":"USN-6112-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6112-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994893?format=json","purl":"pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-vgg2-vymx-b3fe"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3"}],"aliases":["CVE-2023-31484"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kcy1-7ny3-sufc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47708?format=json","vulnerability_id":"VCID-kw8t-k4h2-cbcd","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12723.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12723.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12723","reference_id":"","reference_type":"","scores":[{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40876","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40957","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40986","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40912","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40961","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40968","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40987","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40952","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40934","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40976","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40946","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40867","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40774","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40761","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40677","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40529","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40598","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40615","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40521","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40546","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.4062","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1838000","reference_id":"1838000","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1838000"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962005","reference_id":"962005","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962005"},{"reference_url":"https://security.gentoo.org/glsa/202006-03","reference_id":"GLSA-202006-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202006-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0343","reference_id":"RHSA-2021:0343","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0557","reference_id":"RHSA-2021:0557","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0883","reference_id":"RHSA-2021:0883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1032","reference_id":"RHSA-2021:1032","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1032"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1266","reference_id":"RHSA-2021:1266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2184","reference_id":"RHSA-2021:2184","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2184"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7604","reference_id":"RHSA-2026:7604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7604"},{"reference_url":"https://usn.ubuntu.com/4602-1/","reference_id":"USN-4602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4602-1/"},{"reference_url":"https://usn.ubuntu.com/4602-2/","reference_id":"USN-4602-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4602-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994892?format=json","purl":"pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-vgg2-vymx-b3fe"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3"}],"aliases":["CVE-2020-12723"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kw8t-k4h2-cbcd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47706?format=json","vulnerability_id":"VCID-ns9e-t4zg-r3b6","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10543.json","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10543.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10543","reference_id":"","reference_type":"","scores":[{"value":"0.03241","scoring_system":"epss","scoring_elements":"0.87075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03241","scoring_system":"epss","scoring_elements":"0.87096","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03241","scoring_system":"epss","scoring_elements":"0.87103","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03241","scoring_system":"epss","scoring_elements":"0.87116","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03241","scoring_system":"epss","scoring_elements":"0.87052","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03241","scoring_system":"epss","scoring_elements":"0.87082","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03241","scoring_system":"epss","scoring_elements":"0.87063","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.88918","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.8893","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.88924","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.88933","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.88952","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.8886","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.88873","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.88871","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.88869","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.88886","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.88893","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04289","scoring_system":"epss","scoring_elements":"0.88901","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1837975","reference_id":"1837975","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1837975"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962005","reference_id":"962005","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962005"},{"reference_url":"https://security.gentoo.org/glsa/202006-03","reference_id":"GLSA-202006-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202006-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0343","reference_id":"RHSA-2021:0343","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0883","reference_id":"RHSA-2021:0883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1032","reference_id":"RHSA-2021:1032","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1032"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1266","reference_id":"RHSA-2021:1266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1266"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1678","reference_id":"RHSA-2021:1678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2792","reference_id":"RHSA-2021:2792","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2792"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6206","reference_id":"RHSA-2026:6206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6206"},{"reference_url":"https://usn.ubuntu.com/4602-1/","reference_id":"USN-4602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4602-1/"},{"reference_url":"https://usn.ubuntu.com/4602-2/","reference_id":"USN-4602-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4602-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994892?format=json","purl":"pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-vgg2-vymx-b3fe"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3"}],"aliases":["CVE-2020-10543"],"risk_score":3.7,"exploitability":"0.5","weighted_severity":"7.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ns9e-t4zg-r3b6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69473?format=json","vulnerability_id":"VCID-r3y5-1dk2-pyfc","summary":"perl: Perl threads have a working directory race condition where file operations may target unintended paths","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40909.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40909.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40909","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09645","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09788","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.125","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12617","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12659","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1247","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12549","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12599","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12566","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12525","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12487","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1239","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12517","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12483","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12368","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12277","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12413","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12478","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12475","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-40909"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40909","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40909"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/Perl/perl5/issues/10387","reference_id":"10387","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T14:05:00Z/"}],"url":"https://github.com/Perl/perl5/issues/10387"},{"reference_url":"https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e","reference_id":"11a11ecf4bea72b17d250cfb43c897be1341861e","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T14:05:00Z/"}],"url":"https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e"},{"reference_url":"https://www.openwall.com/lists/oss-security/2025/05/22/2","reference_id":"2","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T14:05:00Z/"}],"url":"https://www.openwall.com/lists/oss-security/2025/05/22/2"},{"reference_url":"https://github.com/Perl/perl5/issues/23010","reference_id":"23010","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T14:05:00Z/"}],"url":"https://github.com/Perl/perl5/issues/23010"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369407","reference_id":"2369407","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369407"},{"reference_url":"https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch","reference_id":"918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T14:05:00Z/"}],"url":"https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch"},{"reference_url":"https://security.archlinux.org/AVG-2890","reference_id":"AVG-2890","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2890"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226","reference_id":"bugreport.cgi?bug=1098226","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T14:05:00Z/"}],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226"},{"reference_url":"https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads","reference_id":"perl5136delta#Directory-handles-not-copied-to-threads","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T14:05:00Z/"}],"url":"https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11545","reference_id":"RHSA-2025:11545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11804","reference_id":"RHSA-2025:11804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11804"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11805","reference_id":"RHSA-2025:11805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12056","reference_id":"RHSA-2025:12056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13267","reference_id":"RHSA-2025:13267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8096","reference_id":"RHSA-2026:8096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8096"},{"reference_url":"https://usn.ubuntu.com/7678-1/","reference_id":"USN-7678-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7678-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994893?format=json","purl":"pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-vgg2-vymx-b3fe"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3"}],"aliases":["CVE-2025-40909"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r3y5-1dk2-pyfc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79904?format=json","vulnerability_id":"VCID-vdc9-td4x-qkek","summary":"perl-CPAN: Bypass of verification of signatures in CHECKSUMS files","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16156.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16156.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16156","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05477","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05372","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05417","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05461","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05473","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05689","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05721","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05747","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05725","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05718","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05712","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05667","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05677","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05826","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05858","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05894","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05904","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05615","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05649","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05681","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16156"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015985","reference_id":"1015985","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015985"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2035273","reference_id":"2035273","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2035273"},{"reference_url":"https://security.archlinux.org/AVG-2630","reference_id":"AVG-2630","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8432","reference_id":"RHSA-2025:8432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8432"},{"reference_url":"https://usn.ubuntu.com/5689-1/","reference_id":"USN-5689-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5689-1/"},{"reference_url":"https://usn.ubuntu.com/5689-2/","reference_id":"USN-5689-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5689-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994893?format=json","purl":"pkg:deb/debian/perl@5.36.0-7%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-vgg2-vymx-b3fe"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.36.0-7%252Bdeb12u3"}],"aliases":["CVE-2020-16156"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vdc9-td4x-qkek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48236?format=json","vulnerability_id":"VCID-ysjv-efv9-xke8","summary":"Multiple vulnerabilities have been discovered in Perl, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-47038.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-47038.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-47038","reference_id":"","reference_type":"","scores":[{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28565","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29084","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29013","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28964","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28988","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28966","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28921","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28801","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28689","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28468","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28489","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29136","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28947","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29011","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29054","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29058","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.28989","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29006","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29074","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.28926","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-47038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47038"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2249523","reference_id":"2249523","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T20:34:17Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2249523"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746","reference_id":"bugreport.cgi?bug=1056746","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T20:34:17Z/"}],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-47038","reference_id":"CVE-2023-47038","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T20:34:17Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-47038"},{"reference_url":"https://security.gentoo.org/glsa/202411-09","reference_id":"GLSA-202411-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202411-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2228","reference_id":"RHSA-2024:2228","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T20:34:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3128","reference_id":"RHSA-2024:3128","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T20:34:17Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:3128"},{"reference_url":"https://usn.ubuntu.com/6517-1/","reference_id":"USN-6517-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6517-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994892?format=json","purl":"pkg:deb/debian/perl@5.32.1-4%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-vgg2-vymx-b3fe"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.32.1-4%252Bdeb11u3"}],"aliases":["CVE-2023-47038"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ysjv-efv9-xke8"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63887?format=json","vulnerability_id":"VCID-9ff8-ad5m-dbfb","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12837.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12837.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12837","reference_id":"","reference_type":"","scores":[{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86876","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.8707","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.87011","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.87029","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.87024","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.87038","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86886","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86905","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86898","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86919","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86927","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.8694","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86935","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.8693","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86945","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86949","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86948","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86965","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86971","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86973","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03165","scoring_system":"epss","scoring_elements":"0.86994","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12883"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:N/A:N"},{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://perl5.git.perl.org/perl.git/commitdiff/96c83ed78aeea1a0496dd2b2d935869a822dc8a5","reference_id":"","reference_type":"","scores":[],"url":"https://perl5.git.perl.org/perl.git/commitdiff/96c83ed78aeea1a0496dd2b2d935869a822dc8a5"},{"reference_url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1","reference_id":"","reference_type":"","scores":[],"url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1"},{"reference_url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1","reference_id":"","reference_type":"","scores":[],"url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1"},{"reference_url":"https://rt.perl.org/Public/Bug/Display.html?id=131582","reference_id":"","reference_type":"","scores":[],"url":"https://rt.perl.org/Public/Bug/Display.html?id=131582"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180426-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20180426-0001/"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3982","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3982"},{"reference_url":"http://www.securityfocus.com/bid/100860","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/100860"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1492091","reference_id":"1492091","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1492091"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875596","reference_id":"875596","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875596"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12837","reference_id":"CVE-2017-12837","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6206","reference_id":"RHSA-2026:6206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6206"},{"reference_url":"https://usn.ubuntu.com/3478-1/","reference_id":"USN-3478-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3478-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035728?format=json","purl":"pkg:deb/debian/perl@5.20.2-3%2Bdeb8u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2tv2-wp3x-xbbu"},{"vulnerability":"VCID-6crh-5jp9-c3f8"},{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-9s8b-4xp8-43fn"},{"vulnerability":"VCID-9uk5-5wp6-8kbv"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-drgw-n9p3-ryhd"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-xrsg-uv6h-zubj"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.20.2-3%252Bdeb8u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037017?format=json","purl":"pkg:deb/debian/perl@5.24.1-3%2Bdeb9u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.24.1-3%252Bdeb9u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2017-12837"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9ff8-ad5m-dbfb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59315?format=json","vulnerability_id":"VCID-efz8-y2qe-dkgj","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18311.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18311.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18311","reference_id":"","reference_type":"","scores":[{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93514","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93523","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93531","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.9353","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93539","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93542","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93548","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93547","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93567","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93573","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93579","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93583","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93582","published_at":"2026-04-26T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.9358","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93587","published_at":"2026-05-05T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93601","published_at":"2026-05-07T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93611","published_at":"2026-05-09T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93612","published_at":"2026-05-11T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93618","published_at":"2026-05-12T12:55:00Z"},{"value":"0.11355","scoring_system":"epss","scoring_elements":"0.93631","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646730","reference_id":"1646730","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646730"},{"reference_url":"https://security.gentoo.org/glsa/201909-01","reference_id":"GLSA-201909-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201909-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0001","reference_id":"RHSA-2019:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0010","reference_id":"RHSA-2019:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0109","reference_id":"RHSA-2019:0109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1790","reference_id":"RHSA-2019:1790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1942","reference_id":"RHSA-2019:1942","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1942"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2400","reference_id":"RHSA-2019:2400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2400"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7604","reference_id":"RHSA-2026:7604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7604"},{"reference_url":"https://usn.ubuntu.com/3834-1/","reference_id":"USN-3834-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3834-1/"},{"reference_url":"https://usn.ubuntu.com/3834-2/","reference_id":"USN-3834-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3834-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037017?format=json","purl":"pkg:deb/debian/perl@5.24.1-3%2Bdeb9u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.24.1-3%252Bdeb9u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2018-18311"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-efz8-y2qe-dkgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59318?format=json","vulnerability_id":"VCID-fcg3-35wj-1bbm","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18314.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18314.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18314","reference_id":"","reference_type":"","scores":[{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89891","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89907","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89912","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89929","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89934","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89942","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.8994","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89933","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89948","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.8995","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89944","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89961","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.8996","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89958","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89972","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89987","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89999","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89994","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.90002","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.90017","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646751","reference_id":"1646751","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646751"},{"reference_url":"https://security.gentoo.org/glsa/201909-01","reference_id":"GLSA-201909-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201909-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0001","reference_id":"RHSA-2019:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0010","reference_id":"RHSA-2019:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7604","reference_id":"RHSA-2026:7604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7604"},{"reference_url":"https://usn.ubuntu.com/3834-1/","reference_id":"USN-3834-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3834-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037017?format=json","purl":"pkg:deb/debian/perl@5.24.1-3%2Bdeb9u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.24.1-3%252Bdeb9u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2018-18314"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fcg3-35wj-1bbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59320?format=json","vulnerability_id":"VCID-h9m2-nyf7-17et","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6798.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6798.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6798","reference_id":"","reference_type":"","scores":[{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81649","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.8166","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81682","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.8168","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81707","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81711","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81731","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81719","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81712","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.8175","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81754","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81777","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81787","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81793","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.8181","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81831","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81856","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81853","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.8187","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81911","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6798"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547779","reference_id":"1547779","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547779"},{"reference_url":"https://security.gentoo.org/glsa/201909-01","reference_id":"GLSA-201909-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201909-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1192","reference_id":"RHSA-2018:1192","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1192"},{"reference_url":"https://usn.ubuntu.com/3625-1/","reference_id":"USN-3625-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3625-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2018-6798"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h9m2-nyf7-17et"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63888?format=json","vulnerability_id":"VCID-hyw2-vhpu-uya2","summary":"security update","references":[{"reference_url":"http://mirror.cucumberlinux.com/cucumber/cucumber-1.0/source/lang-base/perl/patches/CVE-2017-12883.patch","reference_id":"","reference_type":"","scores":[],"url":"http://mirror.cucumberlinux.com/cucumber/cucumber-1.0/source/lang-base/perl/patches/CVE-2017-12883.patch"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12883.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12883.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12883","reference_id":"","reference_type":"","scores":[{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89053","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89109","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89062","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89077","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89079","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89097","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89102","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89113","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89107","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04484","scoring_system":"epss","scoring_elements":"0.89121","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89435","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89448","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89384","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89401","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89406","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89408","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89417","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89458","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89478","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04711","scoring_system":"epss","scoring_elements":"0.89387","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12883"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:P"},{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300f#patch1","reference_id":"","reference_type":"","scores":[],"url":"https://perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300f#patch1"},{"reference_url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1","reference_id":"","reference_type":"","scores":[],"url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1"},{"reference_url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1","reference_id":"","reference_type":"","scores":[],"url":"https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1"},{"reference_url":"https://rt.perl.org/Public/Bug/Display.html?id=131598","reference_id":"","reference_type":"","scores":[],"url":"https://rt.perl.org/Public/Bug/Display.html?id=131598"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180426-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20180426-0001/"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3982","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3982"},{"reference_url":"http://www.securityfocus.com/bid/100852","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/100852"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1492093","reference_id":"1492093","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1492093"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875597","reference_id":"875597","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875597"},{"reference_url":"https://security.archlinux.org/AVG-500","reference_id":"AVG-500","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-500"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12883","reference_id":"CVE-2017-12883","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:P"},{"value":"9.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6206","reference_id":"RHSA-2026:6206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6206"},{"reference_url":"https://usn.ubuntu.com/3478-1/","reference_id":"USN-3478-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3478-1/"},{"reference_url":"https://usn.ubuntu.com/3478-2/","reference_id":"USN-3478-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3478-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035728?format=json","purl":"pkg:deb/debian/perl@5.20.2-3%2Bdeb8u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2tv2-wp3x-xbbu"},{"vulnerability":"VCID-6crh-5jp9-c3f8"},{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-9s8b-4xp8-43fn"},{"vulnerability":"VCID-9uk5-5wp6-8kbv"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-drgw-n9p3-ryhd"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-xrsg-uv6h-zubj"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.20.2-3%252Bdeb8u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037017?format=json","purl":"pkg:deb/debian/perl@5.24.1-3%2Bdeb9u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.24.1-3%252Bdeb9u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2017-12883"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hyw2-vhpu-uya2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59319?format=json","vulnerability_id":"VCID-kc81-vy1w-gfdz","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6797.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6797.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6797","reference_id":"","reference_type":"","scores":[{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80898","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80907","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.8093","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80927","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80955","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80962","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80978","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80965","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80956","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80993","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80995","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.81016","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.81025","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.81032","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.81047","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.81069","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.8109","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.81086","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.81104","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.81145","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6797"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547783","reference_id":"1547783","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547783"},{"reference_url":"https://security.gentoo.org/glsa/201909-01","reference_id":"GLSA-201909-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201909-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1192","reference_id":"RHSA-2018:1192","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1192"},{"reference_url":"https://usn.ubuntu.com/3625-1/","reference_id":"USN-3625-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3625-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2018-6797"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kc81-vy1w-gfdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59317?format=json","vulnerability_id":"VCID-p9gy-p1x1-ayfw","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18313.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18313.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18313","reference_id":"","reference_type":"","scores":[{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88602","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88611","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88627","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88629","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88647","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88652","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88664","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88657","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.8867","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88667","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88665","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.8868","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88686","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88685","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88696","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88712","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88725","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88722","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88733","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0414","scoring_system":"epss","scoring_elements":"0.88757","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646738","reference_id":"1646738","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646738"},{"reference_url":"https://security.gentoo.org/glsa/201909-01","reference_id":"GLSA-201909-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201909-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0001","reference_id":"RHSA-2019:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0010","reference_id":"RHSA-2019:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7604","reference_id":"RHSA-2026:7604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7604"},{"reference_url":"https://usn.ubuntu.com/3834-1/","reference_id":"USN-3834-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3834-1/"},{"reference_url":"https://usn.ubuntu.com/3834-2/","reference_id":"USN-3834-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3834-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037017?format=json","purl":"pkg:deb/debian/perl@5.24.1-3%2Bdeb9u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.24.1-3%252Bdeb9u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2018-18313"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p9gy-p1x1-ayfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73643?format=json","vulnerability_id":"VCID-tkh2-ctmb-q7fm","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12015.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12015.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12015","reference_id":"","reference_type":"","scores":[{"value":"0.15065","scoring_system":"epss","scoring_elements":"0.94546","published_at":"2026-04-02T12:55:00Z"},{"value":"0.15065","scoring_system":"epss","scoring_elements":"0.94539","published_at":"2026-04-01T12:55:00Z"},{"value":"0.15065","scoring_system":"epss","scoring_elements":"0.94554","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94847","published_at":"2026-05-14T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94825","published_at":"2026-05-09T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94831","published_at":"2026-05-11T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94836","published_at":"2026-05-12T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94761","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.9477","published_at":"2026-04-08T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94774","published_at":"2026-04-09T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94782","published_at":"2026-04-12T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94783","published_at":"2026-04-13T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.9479","published_at":"2026-04-16T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94794","published_at":"2026-04-18T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94796","published_at":"2026-04-21T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94797","published_at":"2026-04-24T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94798","published_at":"2026-04-26T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.948","published_at":"2026-04-29T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94808","published_at":"2026-05-05T12:55:00Z"},{"value":"0.16032","scoring_system":"epss","scoring_elements":"0.94815","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12015"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900834","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900834"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12015","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12015"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Mar/49","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Mar/49"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://seclists.org/bugtraq/2019/Mar/42","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Mar/42"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180927-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20180927-0001/"},{"reference_url":"https://support.apple.com/kb/HT209600","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209600"},{"reference_url":"https://www.debian.org/security/2018/dsa-4226","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4226"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"http://www.securityfocus.com/bid/104423","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104423"},{"reference_url":"http://www.securitytracker.com/id/1041048","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1041048"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1588760","reference_id":"1588760","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1588760"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:archive\\:\\:tar_project:archive\\:\\:tar:*:*:*:*:*:perl:*:*","reference_id":"cpe:2.3:a:archive\\:\\:tar_project:archive\\:\\:tar:*:*:*:*:*:perl:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:archive\\:\\:tar_project:archive\\:\\:tar:*:*:*:*:*:perl:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapdrive:-:*:*:*:*:unix:*:*","reference_id":"cpe:2.3:a:netapp:snapdrive:-:*:*:*:*:unix:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapdrive:-:*:*:*:*:unix:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-12015","reference_id":"CVE-2018-12015","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-12015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2097","reference_id":"RHSA-2019:2097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7604","reference_id":"RHSA-2026:7604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7604"},{"reference_url":"https://usn.ubuntu.com/3684-1/","reference_id":"USN-3684-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3684-1/"},{"reference_url":"https://usn.ubuntu.com/3684-2/","reference_id":"USN-3684-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3684-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035728?format=json","purl":"pkg:deb/debian/perl@5.20.2-3%2Bdeb8u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2tv2-wp3x-xbbu"},{"vulnerability":"VCID-6crh-5jp9-c3f8"},{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-9s8b-4xp8-43fn"},{"vulnerability":"VCID-9uk5-5wp6-8kbv"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-drgw-n9p3-ryhd"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-xrsg-uv6h-zubj"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.20.2-3%252Bdeb8u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037017?format=json","purl":"pkg:deb/debian/perl@5.24.1-3%2Bdeb9u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.24.1-3%252Bdeb9u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2018-12015"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tkh2-ctmb-q7fm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59316?format=json","vulnerability_id":"VCID-vbkg-c84e-g3dx","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18312.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18312.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18312","reference_id":"","reference_type":"","scores":[{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.9334","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93349","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93356","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93355","published_at":"2026-04-07T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93363","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93367","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93372","published_at":"2026-04-13T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93371","published_at":"2026-04-12T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.9339","published_at":"2026-04-16T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93395","published_at":"2026-04-18T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93401","published_at":"2026-04-26T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93404","published_at":"2026-04-24T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.934","published_at":"2026-04-29T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93406","published_at":"2026-05-05T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93418","published_at":"2026-05-07T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93429","published_at":"2026-05-11T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93435","published_at":"2026-05-12T12:55:00Z"},{"value":"0.1085","scoring_system":"epss","scoring_elements":"0.93449","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646734","reference_id":"1646734","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646734"},{"reference_url":"https://security.gentoo.org/glsa/201909-01","reference_id":"GLSA-201909-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201909-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0001","reference_id":"RHSA-2019:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0010","reference_id":"RHSA-2019:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7604","reference_id":"RHSA-2026:7604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7604"},{"reference_url":"https://usn.ubuntu.com/3834-1/","reference_id":"USN-3834-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3834-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037017?format=json","purl":"pkg:deb/debian/perl@5.24.1-3%2Bdeb9u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.24.1-3%252Bdeb9u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2018-18312"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vbkg-c84e-g3dx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59321?format=json","vulnerability_id":"VCID-xm1g-4mbg-cud5","summary":"Multiple vulnerabilities have been found in Perl, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6913.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6913.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6913","reference_id":"","reference_type":"","scores":[{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88218","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88226","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88241","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88246","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88265","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88271","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88283","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88274","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88288","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88286","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88285","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88303","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88308","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88311","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88322","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88338","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.8835","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88347","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.8836","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03896","scoring_system":"epss","scoring_elements":"0.88388","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6913"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6913"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547772","reference_id":"1547772","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547772"},{"reference_url":"https://security.gentoo.org/glsa/201909-01","reference_id":"GLSA-201909-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201909-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6206","reference_id":"RHSA-2026:6206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6206"},{"reference_url":"https://usn.ubuntu.com/3625-1/","reference_id":"USN-3625-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3625-1/"},{"reference_url":"https://usn.ubuntu.com/3625-2/","reference_id":"USN-3625-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3625-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035728?format=json","purl":"pkg:deb/debian/perl@5.20.2-3%2Bdeb8u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2tv2-wp3x-xbbu"},{"vulnerability":"VCID-6crh-5jp9-c3f8"},{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-9s8b-4xp8-43fn"},{"vulnerability":"VCID-9uk5-5wp6-8kbv"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-drgw-n9p3-ryhd"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-xrsg-uv6h-zubj"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.20.2-3%252Bdeb8u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037017?format=json","purl":"pkg:deb/debian/perl@5.24.1-3%2Bdeb9u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9ff8-ad5m-dbfb"},{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-efz8-y2qe-dkgj"},{"vulnerability":"VCID-fcg3-35wj-1bbm"},{"vulnerability":"VCID-h9m2-nyf7-17et"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-hyw2-vhpu-uya2"},{"vulnerability":"VCID-kc81-vy1w-gfdz"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-p9gy-p1x1-ayfw"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-tkh2-ctmb-q7fm"},{"vulnerability":"VCID-vbkg-c84e-g3dx"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-xm1g-4mbg-cud5"},{"vulnerability":"VCID-yq1q-x52j-w7at"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.24.1-3%252Bdeb9u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2018-6913"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xm1g-4mbg-cud5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/353910?format=json","vulnerability_id":"VCID-yq1q-x52j-w7at","summary":"Storable versions before 3.05 for Perl has a stack overflow.\n\nThe retrieve_hook function stored the length of the class name into a signed integer but in read operations treated the length as unsigned. This allowed an attacker to craft data that could trigger the overflow.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-20230.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-20230.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-20230","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07143","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07148","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09881","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09906","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09838","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.0967","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09754","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09982","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.0992","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-20230"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-20230","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-20230"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/Perl/perl5/issues/15831","reference_id":"15831","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-21T16:28:22Z/"}],"url":"https://github.com/Perl/perl5/issues/15831"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2460147","reference_id":"2460147","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2460147"},{"reference_url":"https://github.com/Perl/perl5/commit/a258c17c6937f79529c8319a829310e09cdbd216.patch","reference_id":"a258c17c6937f79529c8319a829310e09cdbd216.patch","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-21T16:28:22Z/"}],"url":"https://github.com/Perl/perl5/commit/a258c17c6937f79529c8319a829310e09cdbd216.patch"},{"reference_url":"https://metacpan.org/release/RURBAN/Storable-3.05/changes","reference_id":"changes","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-21T16:28:22Z/"}],"url":"https://metacpan.org/release/RURBAN/Storable-3.05/changes"},{"reference_url":"https://www.nntp.perl.org/group/perl.perl5.porters/2017/01/msg242533.html","reference_id":"msg242533.html","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-21T16:28:22Z/"}],"url":"https://www.nntp.perl.org/group/perl.perl5.porters/2017/01/msg242533.html"},{"reference_url":"https://www.nntp.perl.org/group/perl.perl5.porters/2017/01/msg242703.html","reference_id":"msg242703.html","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-21T16:28:22Z/"}],"url":"https://www.nntp.perl.org/group/perl.perl5.porters/2017/01/msg242703.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7578","reference_id":"RHSA-2026:7578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7578"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049906?format=json","purl":"pkg:deb/debian/perl@5.28.1-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-a1cw-hg74-v3c3"},{"vulnerability":"VCID-hf7c-n8hb-q7dk"},{"vulnerability":"VCID-kcy1-7ny3-sufc"},{"vulnerability":"VCID-kw8t-k4h2-cbcd"},{"vulnerability":"VCID-ns9e-t4zg-r3b6"},{"vulnerability":"VCID-r3y5-1dk2-pyfc"},{"vulnerability":"VCID-vdc9-td4x-qkek"},{"vulnerability":"VCID-ysjv-efv9-xke8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}],"aliases":["CVE-2017-20230"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yq1q-x52j-w7at"}],"risk_score":"3.9","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/perl@5.28.1-6%252Bdeb10u1"}