Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

perl

About This Vendor

perl is a technology vendor producing software and infrastructure products. As a software provider, perl's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of perl's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 66 known vulnerabilities from perl. This includes 10 critical-severity issues and 27 high-severity issues that represent significant risk. These vulnerabilities affect 64 distinct products across perl's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 1999 through 2025, indicating decades of continuous security attention and research. Organizations deploying perl products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-1999-1386 1999-12-31 2025-04-03 5.5 2.1 Unknown
CVE-2003-1365 2003-12-31 2025-04-03 - 5.0 Likely
CVE-2003-0618 2004-05-04 2025-04-03 - 2.1 Unknown
CVE-2005-1349 2005-05-02 2025-04-03 - 7.5 Likely
CVE-2005-3962 2005-12-01 2025-04-03 - 4.6 Unknown
CVE-2006-7225 2007-12-03 2025-04-09 - 4.3 Likely
CVE-2008-1927 2008-04-24 2025-04-09 - 5.0 Likely
CVE-2008-2827 2008-06-23 2025-04-09 - 4.6 Unknown
CVE-2008-5302 2008-12-01 2025-04-09 - 6.9 Unknown
CVE-2008-5303 2008-12-01 2025-04-09 - 6.9 Unknown
CVE-2009-0663 2009-04-30 2025-04-09 - 7.5 Likely
CVE-2009-1884 2009-08-19 2025-04-09 - 4.3 Likely
CVE-2009-3626 2009-10-29 2025-04-09 - 5.0 Likely
CVE-2010-1158 2010-04-20 2025-04-11 - 5.0 Likely
CVE-2010-1168 2010-06-21 2025-04-11 - 7.5 Likely
CVE-2011-1487 2011-04-11 2025-04-11 - 5.0 Likely
CVE-2011-0761 2011-05-13 2025-04-11 - 5.0 Likely
CVE-2011-2201 2011-09-14 2025-04-11 - 4.3 Likely
CVE-2011-3599 2011-10-10 2025-04-11 - 5.8 Likely
CVE-2011-2939 2012-01-13 2025-04-11 - 5.1 Unknown
CVE-2012-1151 2012-09-09 2025-04-11 - 5.0 Likely
CVE-2011-4363 2012-10-07 2025-04-11 - 2.6 Unknown
CVE-2012-5195 2012-12-18 2025-04-11 - 7.5 Likely
CVE-2011-2728 2012-12-21 2025-04-11 - 4.3 Likely
CVE-2012-6329 2013-01-04 2025-04-11 - 7.5 Likely
CVE-2013-1667 2013-03-14 2025-04-11 - 7.5 Likely
CVE-2010-4777 2014-02-10 2025-04-11 - 4.3 Likely
CVE-2014-4330 2014-09-30 2025-04-12 - 2.1 Unknown
CVE-2013-7329 2014-10-06 2025-04-12 - 5.0 Likely
CVE-2013-7422 2015-08-16 2025-04-12 - 7.5 Likely
CVE-2015-8607 2016-01-13 2025-04-12 7.3 7.5 Likely
CVE-2016-2381 2016-04-08 2025-04-12 7.5 5.0 Likely
CVE-2015-8853 2016-05-25 2025-04-12 7.5 5.0 Likely
CVE-2016-1238 2016-08-02 2025-04-12 7.8 7.2 Unknown
CVE-2016-6185 2016-08-02 2025-04-12 7.8 4.6 Unknown
CVE-2016-1246 2016-10-05 2025-04-12 7.5 5.0 Likely
CVE-2015-8608 2017-02-07 2025-04-20 9.8 7.5 Likely
CVE-2017-12837 2017-09-19 2025-04-20 7.5 5.0 Likely
CVE-2017-12883 2017-09-19 2025-04-20 9.1 6.4 Likely
CVE-2017-12814 2017-09-28 2025-04-20 9.8 7.5 Likely
CVE-2018-6797 2018-04-17 2024-11-21 9.8 7.5 Likely
CVE-2018-6798 2018-04-17 2024-11-21 7.5 5.0 Likely
CVE-2018-6913 2018-04-17 2024-11-21 9.8 7.5 Likely
CVE-2018-12015 2018-06-07 2024-11-21 7.5 6.4 Likely
CVE-2018-18312 2018-12-05 2024-11-21 9.8 7.5 Likely
CVE-2018-18311 2018-12-07 2024-11-21 9.8 7.5 Likely
CVE-2018-18313 2018-12-07 2024-11-21 9.1 6.4 Likely
CVE-2018-18314 2018-12-07 2024-11-21 9.8 7.5 Likely
CVE-2020-10543 2020-06-05 2024-11-21 8.2 6.4 Likely
CVE-2020-10878 2020-06-05 2024-11-21 8.6 7.5 Likely
CVE-2020-12723 2020-06-05 2024-11-21 7.5 5.0 Likely
CVE-2013-7490 2020-09-11 2024-11-21 5.3 5.0 Likely
CVE-2013-7491 2020-09-11 2024-11-21 5.3 5.0 Likely
CVE-2014-10401 2020-09-11 2024-11-21 6.1 3.6 Unknown
CVE-2020-14392 2020-09-16 2024-11-21 5.5 2.1 Unknown
CVE-2020-14393 2020-09-16 2024-11-21 7.1 3.6 Unknown
CVE-2014-10402 2020-09-16 2024-11-21 6.1 3.6 Unknown
CVE-2019-20919 2020-09-17 2024-11-21 4.7 1.9 Unknown
CVE-2021-36770 2021-08-11 2025-11-03 7.8 6.8 Likely
CVE-2020-16156 2021-12-13 2025-11-03 7.8 6.8 Likely
CVE-2023-31484 2023-04-29 2025-11-03 8.1 - -
CVE-2023-31486 2023-04-29 2025-01-30 8.1 - -
CVE-2022-48522 2023-08-22 2024-11-21 9.8 - -
CVE-2023-47038 2023-12-18 2025-11-04 7.0 - -
CVE-2023-47039 2024-01-02 2024-11-21 7.8 - -
CVE-2024-56406 2025-04-13 2025-10-16 8.4 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for perl by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with perl's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.