Lookup for vulnerable packages by Package URL.

GET /api/packages/77793?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/77793?format=api",
    "purl": "pkg:ebuild/dev-lang/v8@18.0.1025.142",
    "type": "ebuild",
    "namespace": "dev-lang",
    "name": "v8",
    "version": "18.0.1025.142",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "19.0.1084.46",
    "latest_non_vulnerable_version": "33.0.1750.146",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49228?format=api",
            "vulnerability_id": "VCID-1zkd-zp3h-eyfn",
            "summary": "Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3062.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3062.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3062",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85054",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84954",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84968",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84985",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8499",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85012",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85019",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85035",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85034",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8503",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85051",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3062"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815042",
                    "reference_id": "815042",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815042"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3062",
                    "reference_id": "CVE-2011-3062",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3062"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201203-24",
                    "reference_id": "GLSA-201203-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201203-24"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-31",
                    "reference_id": "mfsa2012-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-31"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77792?format=api",
                    "purl": "pkg:ebuild/dev-lang/v8@3.8.9.16",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.8.9.16"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77793?format=api",
                    "purl": "pkg:ebuild/dev-lang/v8@18.0.1025.142",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@18.0.1025.142"
                }
            ],
            "aliases": [
                "CVE-2011-3062"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1zkd-zp3h-eyfn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49230?format=api",
            "vulnerability_id": "VCID-9d22-4pny-huca",
            "summary": "Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3064.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3064.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3064",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88165",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88173",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88189",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88195",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88214",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8822",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88231",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88224",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88223",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88237",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88236",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3064"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=807596",
                    "reference_id": "807596",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=807596"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201203-24",
                    "reference_id": "GLSA-201203-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201203-24"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1617-1/",
                    "reference_id": "USN-1617-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1617-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77792?format=api",
                    "purl": "pkg:ebuild/dev-lang/v8@3.8.9.16",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.8.9.16"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77793?format=api",
                    "purl": "pkg:ebuild/dev-lang/v8@18.0.1025.142",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@18.0.1025.142"
                }
            ],
            "aliases": [
                "CVE-2011-3064"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9d22-4pny-huca"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49229?format=api",
            "vulnerability_id": "VCID-kg7u-799f-cqcr",
            "summary": "Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3063",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64772",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64823",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6485",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64813",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64863",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64878",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64895",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64885",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64858",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64896",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64906",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3063"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201203-24",
                    "reference_id": "GLSA-201203-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201203-24"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77792?format=api",
                    "purl": "pkg:ebuild/dev-lang/v8@3.8.9.16",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.8.9.16"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77793?format=api",
                    "purl": "pkg:ebuild/dev-lang/v8@18.0.1025.142",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@18.0.1025.142"
                }
            ],
            "aliases": [
                "CVE-2011-3063"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kg7u-799f-cqcr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49224?format=api",
            "vulnerability_id": "VCID-kruq-kj99-r3dw",
            "summary": "Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3058",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73161",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73171",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73192",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73166",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73202",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73216",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73241",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73222",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73258",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73267",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3058"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201203-24",
                    "reference_id": "GLSA-201203-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201203-24"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77792?format=api",
                    "purl": "pkg:ebuild/dev-lang/v8@3.8.9.16",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.8.9.16"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77793?format=api",
                    "purl": "pkg:ebuild/dev-lang/v8@18.0.1025.142",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@18.0.1025.142"
                }
            ],
            "aliases": [
                "CVE-2011-3058"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kruq-kj99-r3dw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49225?format=api",
            "vulnerability_id": "VCID-rm5c-5a9h-pbdw",
            "summary": "Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3059.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3059.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3059",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84828",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84843",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84861",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84863",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84886",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84893",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84911",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8491",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84904",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84926",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84927",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3059"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=807588",
                    "reference_id": "807588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=807588"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201203-24",
                    "reference_id": "GLSA-201203-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201203-24"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1617-1/",
                    "reference_id": "USN-1617-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1617-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77792?format=api",
                    "purl": "pkg:ebuild/dev-lang/v8@3.8.9.16",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.8.9.16"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77793?format=api",
                    "purl": "pkg:ebuild/dev-lang/v8@18.0.1025.142",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@18.0.1025.142"
                }
            ],
            "aliases": [
                "CVE-2011-3059"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rm5c-5a9h-pbdw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49231?format=api",
            "vulnerability_id": "VCID-tdf1-u3yz-afa5",
            "summary": "Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3065",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82675",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82691",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82704",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.827",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82726",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82733",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8275",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82744",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82741",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82779",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3065"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201203-24",
                    "reference_id": "GLSA-201203-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201203-24"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77792?format=api",
                    "purl": "pkg:ebuild/dev-lang/v8@3.8.9.16",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.8.9.16"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77793?format=api",
                    "purl": "pkg:ebuild/dev-lang/v8@18.0.1025.142",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@18.0.1025.142"
                }
            ],
            "aliases": [
                "CVE-2011-3065"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tdf1-u3yz-afa5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49227?format=api",
            "vulnerability_id": "VCID-wx6x-kgp2-8kby",
            "summary": "Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3061",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46469",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46506",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46526",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46475",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4653",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46553",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46525",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46534",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46591",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46588",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3061"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201203-24",
                    "reference_id": "GLSA-201203-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201203-24"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77792?format=api",
                    "purl": "pkg:ebuild/dev-lang/v8@3.8.9.16",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.8.9.16"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77793?format=api",
                    "purl": "pkg:ebuild/dev-lang/v8@18.0.1025.142",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@18.0.1025.142"
                }
            ],
            "aliases": [
                "CVE-2011-3061"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wx6x-kgp2-8kby"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49226?format=api",
            "vulnerability_id": "VCID-ytvh-memc-p7b7",
            "summary": "Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3060.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3060.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3060",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81486",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81497",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81519",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81517",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81545",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81551",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81571",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81558",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81588",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8159",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3060"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=807588",
                    "reference_id": "807588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=807588"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201203-24",
                    "reference_id": "GLSA-201203-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201203-24"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1617-1/",
                    "reference_id": "USN-1617-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1617-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77792?format=api",
                    "purl": "pkg:ebuild/dev-lang/v8@3.8.9.16",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.8.9.16"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77793?format=api",
                    "purl": "pkg:ebuild/dev-lang/v8@18.0.1025.142",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@18.0.1025.142"
                }
            ],
            "aliases": [
                "CVE-2011-3060"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ytvh-memc-p7b7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49223?format=api",
            "vulnerability_id": "VCID-z1k5-aw7s-d7ch",
            "summary": "Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3057",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8363",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83643",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83657",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83659",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83683",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83689",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83706",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83699",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83694",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8373",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3057"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201203-19",
                    "reference_id": "GLSA-201203-19",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201203-19"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201203-24",
                    "reference_id": "GLSA-201203-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201203-24"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77792?format=api",
                    "purl": "pkg:ebuild/dev-lang/v8@3.8.9.16",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.8.9.16"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77793?format=api",
                    "purl": "pkg:ebuild/dev-lang/v8@18.0.1025.142",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@18.0.1025.142"
                }
            ],
            "aliases": [
                "CVE-2011-3057"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z1k5-aw7s-d7ch"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@18.0.1025.142"
}