{"url":"http://public2.vulnerablecode.io/api/packages/71997?format=json","purl":"pkg:ebuild/dev-lang/perl@5.8.7-r3","type":"ebuild","namespace":"dev-lang","name":"perl","version":"5.8.7-r3","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"5.8.8-r4","latest_non_vulnerable_version":"5.38.2","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31917?format=json","vulnerability_id":"VCID-r8f2-wuqh-mkgz","summary":"A fix is available for Perl to mitigate the effects of format string\n    programming errors, that could otherwise be exploited to execute arbitrary\n    code.","references":[{"reference_url":"ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/007_perl.patch","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/007_perl.patch"},{"reference_url":"ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/001_perl.patch","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/001_perl.patch"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U"},{"reference_url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056","reference_id":"","reference_type":"","scores":[],"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056"},{"reference_url":"http://docs.info.apple.com/article.html?artnum=304829","reference_id":"","reference_type":"","scores":[],"url":"http://docs.info.apple.com/article.html?artnum=304829"},{"reference_url":"http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html"},{"reference_url":"http://marc.info/?l=full-disclosure&m=113342788118630&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=full-disclosure&m=113342788118630&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3962.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3962.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3962","reference_id":"","reference_type":"","scores":[{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75666","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75523","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75525","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75555","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75535","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75576","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75587","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75612","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75593","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75586","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75624","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75627","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.7565","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75655","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3962"},{"reference_url":"http://secunia.com/advisories/17762","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17762"},{"reference_url":"http://secunia.com/advisories/17802","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17802"},{"reference_url":"http://secunia.com/advisories/17844","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17844"},{"reference_url":"http://secunia.com/advisories/17941","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17941"},{"reference_url":"http://secunia.com/advisories/17952","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17952"},{"reference_url":"http://secunia.com/advisories/17993","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17993"},{"reference_url":"http://secunia.com/advisories/18075","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18075"},{"reference_url":"http://secunia.com/advisories/18183","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18183"},{"reference_url":"http://secunia.com/advisories/18187","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18187"},{"reference_url":"http://secunia.com/advisories/18295","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18295"},{"reference_url":"http://secunia.com/advisories/18413","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18413"},{"reference_url":"http://secunia.com/advisories/18517","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18517"},{"reference_url":"http://secunia.com/advisories/19041","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19041"},{"reference_url":"http://secunia.com/advisories/20894","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/20894"},{"reference_url":"http://secunia.com/advisories/23155","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/23155"},{"reference_url":"http://secunia.com/advisories/31208","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31208"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10598","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10598"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1074","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1074"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102192-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102192-1"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm"},{"reference_url":"https://www.redhat.com/archives/fedora-legacy-announce/2006-February/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-legacy-announce/2006-February/msg00008.html"},{"reference_url":"http://www.debian.org/security/2006/dsa-943","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-943"},{"reference_url":"http://www.dyadsecurity.com/perl-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.dyadsecurity.com/perl-0002.html"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200512-01.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200512-01.xml"},{"reference_url":"http://www.ipcop.org/index.php?name=News&file=article&sid=41","reference_id":"","reference_type":"","scores":[],"url":"http://www.ipcop.org/index.php?name=News&file=article&sid=41"},{"reference_url":"http://www.kb.cert.org/vuls/id/948385","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/948385"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:225","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:225"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_29_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_29_sr.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_71_perl.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_71_perl.html"},{"reference_url":"http://www.openbsd.org/errata37.html#perl","reference_id":"","reference_type":"","scores":[],"url":"http://www.openbsd.org/errata37.html#perl"},{"reference_url":"http://www.openpkg.org/security/OpenPKG-SA-2005.025-perl.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openpkg.org/security/OpenPKG-SA-2005.025-perl.html"},{"reference_url":"http://www.osvdb.org/21345","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/21345"},{"reference_url":"http://www.osvdb.org/22255","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/22255"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-880.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-880.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-881.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-881.html"},{"reference_url":"http://www.securityfocus.com/archive/1/418333/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/418333/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/438726/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/438726/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/15629","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/15629"},{"reference_url":"http://www.trustix.org/errata/2005/0070","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2005/0070"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA06-333A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA06-333A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2688","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2688"},{"reference_url":"http://www.vupen.com/english/advisories/2006/0771","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/0771"},{"reference_url":"http://www.vupen.com/english/advisories/2006/2613","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/2613"},{"reference_url":"http://www.vupen.com/english/advisories/2006/4750","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/4750"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617848","reference_id":"1617848","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617848"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=341542","reference_id":"341542","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=341542"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:perl:perl:5.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3962","reference_id":"CVE-2005-3962","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3962"},{"reference_url":"https://security.gentoo.org/glsa/200512-01","reference_id":"GLSA-200512-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200512-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:880","reference_id":"RHSA-2005:880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:881","reference_id":"RHSA-2005:881","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:881"},{"reference_url":"https://usn.ubuntu.com/222-1/","reference_id":"USN-222-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/222-1/"},{"reference_url":"https://usn.ubuntu.com/222-2/","reference_id":"USN-222-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/222-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71997?format=json","purl":"pkg:ebuild/dev-lang/perl@5.8.7-r3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/perl@5.8.7-r3"}],"aliases":["CVE-2005-3962"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r8f2-wuqh-mkgz"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/perl@5.8.7-r3"}